Solved

Change  to CheckBox Option

Posted on 2013-01-15
7
357 Views
Last Modified: 2013-01-15
Hello All,

Can you help me Change the “ShipName” field in the form to a checkbox instead?

Like a checkbox with “Jones” – when user click on it, it filters the subform by Jones?
Is that at all possible within the access limitations?

Sorry have something that due in few hours from now...
finalTestPleaseRev101.accdb
0
Comment
Question by:Rayne
  • 3
  • 3
7 Comments
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 38780756
that is possible, but you will have a lot of checkboxes..


do you still want it?
0
 
LVL 61

Expert Comment

by:mbizup
ID: 38780773
0
 
LVL 61

Accepted Solution

by:
mbizup earned 500 total points
ID: 38780779
By the way, there are no "Jones" records in the data in this file...

but look at the code in the checkbox's click event and change the text if needed:

Private Sub chkJones_Click()
    If Me.chkJones = True Then
         Me.frmSource.Form.Filter = "[Ship Name] Like '*Jones*'"
         Me.frmSource.Form.FilterOn = True
    Else
        Me.frmSource.Form.FilterOn = False
        Me.frmSource.Form.Filter = ""
    End If
End Sub

Open in new window

0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Closing Comment

by:Rayne
ID: 38781238
Awesome, that works like a Charm :)
Thank you
0
 

Author Comment

by:Rayne
ID: 38781276
0
 
LVL 61

Expert Comment

by:mbizup
ID: 38781285
Thats a great article!   If you have done so yet vote yes at the bottom of the article and post a reader comment.
0
 

Author Comment

by:Rayne
ID: 38781295
thanks  mbizup, done :)
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The Visual Basic for Applications (VBA) language is at the heart of every application that you write. It is your key to taking Access beyond the world of wizards into a world where anything is possible. This article introduces you to…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question