Solved

Looking for All Occurrences of a Query

Posted on 2013-01-07
16
310 Views
Last Modified: 2013-01-07
What is the easiest way for me to do a search on where a particular query occurs in the database application. I would like to see a list of wherever this query is defined or called. This includes all objects within the database, e.g., modules, forms, tables, etc.
0
Comment
Question by:geeta_m9
  • 5
  • 5
  • 3
  • +2
16 Comments
 
LVL 61

Assisted Solution

by:mbizup
mbizup earned 100 total points
ID: 38751781
I haven't used this myself but many Experts here highly recommend this Find and Replace tool:
http://www.rickworld.com/
0
 
LVL 75

Assisted Solution

by:DatabaseMX (Joe Anderson - Microsoft MVP, Access and Data Platform)
DatabaseMX (Joe Anderson - Microsoft MVP, Access and Data Platform) earned 100 total points
ID: 38751792
Best tool ever ... I use is daily.

http://www.rickworld.com/products.html#Find%20and%20Replace%209.0

Get it.
0
 
LVL 57
ID: 38751807
Well worth the price and have used it for years.   And it's not just a simple find and replace; there is a cross-reference utility in there that is great for figuring out and cleaning up old databases.

Jim.
0
Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 75
ID: 38751830
In fact, the functionality is second to none.
You can even search table fields for data ... and a LOT more.

mx
0
 
LVL 47

Expert Comment

by:Dale Fye (Access MVP)
ID: 38751865
concur with all of the above.
0
 

Author Comment

by:geeta_m9
ID: 38751958
The website doesn't appear to  have an evaluation copy, though. You have to purchase it right away.
0
 
LVL 47

Accepted Solution

by:
Dale Fye (Access MVP) earned 100 total points
ID: 38751973
The second paragraph at:

http://www.rickworld.com/products.html#Find%20and%20Replace%209.0

says:

"The unregistered shareware version is available for download."

and contains a link.
0
 
LVL 75
ID: 38752050
You can evaluate - but not all features are available ....

mx
0
 

Author Comment

by:geeta_m9
ID: 38752062
Yes, I noticed that.
0
 
LVL 75
ID: 38752092
If you plan to work with Access dbs ... this tool is indispensable ... worth 100x the cost.

mx
0
 

Author Comment

by:geeta_m9
ID: 38752095
You are right! This tool works very well.

Thanks for the recommendation! I found I was looking for very quickly.
0
 
LVL 57
ID: 38752235
Don't skip the cross-reference utility...it's a button off to the right.

What it does is scan the entire DB and notes where an object is used.  For example, will tell you every place your query is called.

More importantly though it can return a list of all objects not used, which is very handy in cleaning up an old DB.

Jim.
0
 

Author Comment

by:geeta_m9
ID: 38752249
Noted, thank you!

G
0
 
LVL 75
ID: 38752267
Example of searching specific Fields in a table - for example say you have a Configuration table (or whatnot) - maybe you have have some query names in it - whatever. You can have F&R optionally search these custom properties ... VERY handy.

F
mx
0
 

Author Comment

by:geeta_m9
ID: 38752279
Some of these features are not available to me currently because I don't have the full version yet. However, I think I will purchase it. It is a pretty handy tool and doesn't cost very much.
0
 
LVL 47

Expert Comment

by:Dale Fye (Access MVP)
ID: 38752319
as MX mentioned, easily worth 100x the cost.

If you are a professional developer, or are developing for your office, you can easily save the cost of the product the first time you use it to find, in your case, all instances where a particular query is referenced.

Even bigger help when changing the name of a field in a table, and all of the queries/reports/code where that field name is used.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will guide you to convert a grid from a picture into Excel format using Microsoft OneNote and no other 3rd party application.
A simple tool to export all objects of two Access files as text and compare it with Meld, a free diff tool.
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question