Solved

Microsoft Access 2007

Posted on 2011-09-26
1
213 Views
Last Modified: 2012-05-12
Hi,

I am looking to use this functionality for the first time. We need a simple interface to allow a customer to edit their business data in 1 of our database tables in MS SQL Server 2008.
I have a few questions that I need help with:

1. Can an Access form be launched outside of MS Access, like an .exe?
2. Can we limit the customer to only view and edit certain tables in the schema?
3. Can we embed custom SQL in the Form?

Many thanks,

Iain
0
Comment
Question by:mullykid
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 20

Accepted Solution

by:
clarkscott earned 500 total points
ID: 36598787
1.  You can install the Access Runtime exe and run your Access app like an exe.
2.  You can control anything you want (use access to forms, fields, etc.)
3.  Yes.

Scott C
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Preparing an email is something we should all take special care with – especially when the email is for somebody you may not know very well. The pressures of everyday working life stacked with a hectic office environment can make this a real challen…
Code that checks the QuickBooks schema table for non-updateable fields and then disables those controls on a form so users don't try to update them.
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question