Solved

ACCESSS

Posted on 2013-01-17
9
249 Views
Last Modified: 2013-02-15
I ALREADY CREATED A TABLE WITH MANY FIELDS .. CAN I CREATED ANOTHER TABLE AND PULL INFO "COPY" OUT FROM A NEW ONE ONT THIS ONE I WOULD LIKE TO CREATE SUBDATASHEET. HOW CAN I DO THAT?
0
Comment
Question by:gabgar
  • 3
  • 2
9 Comments
 
LVL 65

Accepted Solution

by:
Jim Horn earned 250 total points
ID: 38789670
Dude, turn off the ALL CAPS.

>CAN I CREATED ANOTHER TABLE
Yes, you can have as many tables as you want.

>AND PULL INFO "COPY" OUT FROM A NEW ONE
Not sure what you mean by INFO "COPY".   If you want to copy contents of a table into a new one, the query SQL would go something like this:

SELECT * INTO YourNewTable FROM YourOldTable

>I WOULD LIKE TO CREATE SUBDATASHEET.
Tell us what your needs are.
0
 
LVL 26

Assisted Solution

by:jerryb30
jerryb30 earned 250 total points
ID: 38789684
A query created from the original table will have the same properties (mostly) as a table for forms, reports, etc.
As in: Select field1, field2, field4 (etc) from yourTable.
So, any updates to the original table will contain any updates.

This can be used as source for a sub-form.

Is that what you want?

(Use of all caps in your question is not necessary, and can be upsetting to the eyes.)
0
 

Author Comment

by:gabgar
ID: 38790027
Sorry for the caps.. Wont do it again.
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 

Author Comment

by:gabgar
ID: 38841848
I've requested that this question be closed as follows:

Accepted answer: 0 points for gabgar's comment #a38790027

for the following reason:

Prompt response
0
 
LVL 65

Expert Comment

by:Jim Horn
ID: 38841846
The question was answered two ways.  Please explain why this is being closed without awarding points.
0
 
LVL 65

Expert Comment

by:Jim Horn
ID: 38841849
The question was answered two ways.  Please explain why this is being closed without awarding points.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

QuickBooks® has a great invoice interface that we were happy with for a while but that changed in 2001 through no fault of Intuit®. Our industry's unit names are dictated by RUS: the Rural Utilities Services division of USDA. Contracts contain un…
In a multiple monitor setup, if you don't want to use AutoCenter to position your popup forms, you have a problem: where will they appear?  Sometimes you may have an additional problem: where the devil did they go?  If you last had a popup form open…
Familiarize people with the process of utilizing SQL Server stored procedures from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Micr…
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now