Solved

Adding 2 tables via Query Design

Posted on 2011-09-16
4
287 Views
Last Modified: 2012-05-12
Hi there,

I am trying to add 2 tables via a query design.

The calculation in expression builder is this

LTL: [getOriginBeyond]![LTL] + [getDestinBeyond]![LTL]

Open in new window


The values on each of the above LTL sides is
16.1 and 14.36

The result I am getting in the results table is "16.114.36"

Hence this is being treated as a text addition

Since 'getOriginBeyond' data is being derived from another tabled called "ZONES", I went there and tried to change the 'Data Type' but it wouldn't let me change the data type :/

Any quick fixes to this?

Thanks!


0
Comment
Question by:Shanan212
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
Michael Vasilevsky earned 500 total points
ID: 36552411
LTL: Cdbl([getOriginBeyond]![LTL]) + Cdbl([getDestinBeyond]![LTL])

0
 
LVL 92

Expert Comment

by:Patrick Matthews
ID: 36552412
If those are both currently text:

LTL: Val([getOriginBeyond]![LTL]) + Val([getDestinBeyond]![LTL])

Open in new window


0
 
LVL 10

Expert Comment

by:Michael Vasilevsky
ID: 36552414
Cdbl() converts the data in your field to the double (number) data type and they should add as expected then
0
 
LVL 13

Author Closing Comment

by:Shanan212
ID: 36552423
wow! Nice! Thank you and have a great weekend!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Familiarize people with the process of utilizing SQL Server stored procedures from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Micr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question