?
Solved

MS Access - Finding Queries Not Used In Macros

Posted on 2012-03-22
6
Medium Priority
?
273 Views
Last Modified: 2012-03-22
I have an old database that has grown a beard and walks with a cane...  I have queries and probably tables that are not used and are just taking up space.   My DB runs from macros so I'm trying to find a way that will list out all the macros' actions.  With that I can try to figure out which objects are not being used.  Is there another way to do this other than the build in documenter (it sucks..)

Another thing that would help is a list of all queries that have no dependencies... Looking in the Object Dependencies it doesn't show Macro dependencies... Not much help for me.

Any ideas?
0
Comment
Question by:keschuster
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 48

Accepted Solution

by:
Dale Fye earned 2000 total points
ID: 37752666
You might want to take a look at Total Access Analyzer
0
 
LVL 58
ID: 37752790
Better yet,

Find and replace:

www.rickworld.com

There is a cross reference utility in there that will do exaclt y what you want, and it's a heck of a lot cheaper.

Jim.
0
 
LVL 48

Expert Comment

by:Dale Fye
ID: 37752801
Jim,

Good info.  I have used Total Access Analyzer in the past (convinced a previous employer that is was a necessity), but did not realize the F&R 9.0 (which I own personally) has a cross-reference functionality.  

I'll have to check that out tonight.
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 58
ID: 37752832
<<but did not realize the F&R 9.0 (which I own personally) has a cross-reference functionality>>

 Everyone misses it...

Screen shot
and then you get

screen shot 2
Jim.
0
 

Author Comment

by:keschuster
ID: 37752899
sweet
0
 
LVL 48

Expert Comment

by:Dale Fye
ID: 37752901
Thanks, Jim!
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Code that checks the QuickBooks schema table for non-updateable fields and then disables those controls on a form so users don't try to update them.
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question