Solved

Find queries, macros, etc. that are not called

Posted on 2011-09-12
5
238 Views
Last Modified: 2012-06-27
I inherited 3 applications from former staff that have lots of pieces to them that I think may have been rewritten (and replaced) though not removed from the applications. Is there a reliable utility available that can isolate uncalled Access components?
0
Comment
Question by:bobhiii
5 Comments
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 36522661
you can try "find and replace"

http://www.rickworld.com/download.html

0
 
LVL 77

Accepted Solution

by:
peter57r earned 167 total points
ID: 36522672
0
 
LVL 17

Assisted Solution

by:andrewssd3
andrewssd3 earned 166 total points
ID: 36522731
I like http://www.mztools.com/v3/download.aspx.  It's free and there are a lot of useful tools for VBA here - the Review Sourcecode utility reports on unused procedures and variables.
0
 
LVL 31

Assisted Solution

by:Helen_Feddema
Helen_Feddema earned 167 total points
ID: 36523189
If you can throw money at the problem, get Total Access Analyzer from FMS.  

http://www.fmsinc.com
0
 

Author Closing Comment

by:bobhiii
ID: 36545910
Was hoping for a response that Googling wouldn't provide, more like a hidden gem.
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will show you how to use shortcut menus in the Access run-time environment.
No matter the version of Windows you are using, you may have some problems with Windows Search running too slow or possibly not running at all. Before jumping into how you can solve this issue, just know there are many other viable alternative deskt…
In Microsoft Access, when working with VBA, learn some techniques for writing readable and easily maintained code.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question