Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

MS Access - Compact & Repair

Posted on 2013-06-13
3
Medium Priority
?
669 Views
Last Modified: 2013-06-14
I have a database where all the tables are linked to another database. In addition to the linked tables, the database includes reports, queries, macros and a module.

Does a database with only linked tables require routine maintenance (compact/repair)?
0
Comment
Question by:Tim313
3 Comments
 
LVL 13

Expert Comment

by:Norm Dickinson
ID: 39244461
The compact/repair process is used for tables that contain data, and is especially helpful on tables which contain deleted data or are used for temporary storage of data such as a transaction table. The larger the amount of deleted data, the more often it should be run. It is not necessary on databases which operate correctly and contain little or no data or only static data.
0
 
LVL 20

Accepted Solution

by:
clarkscott earned 2000 total points
ID: 39247621
Actually, an Access "front-end" with no data can still grow in size.  Especially if you have coded sql statements dynmaically created and run.
Access creates under-the-cover things, such as query execution plans, and such.... which can add bytes to your application over time.
You can solve this by going to the applications properties and set "compact on close".

Scott C
0
 

Author Closing Comment

by:Tim313
ID: 39248871
Thank you both for your replies.

I do a weekly compact/repair on the BE, but not on the FE. I have noticed that over time the FE was increasing in size, hence the question. I had thought that without data there was no need, but could not figure out why the increase in size.  I'm using a VB2010 application (running on both computers) that does have sql statements dynamically created and run. I'll add the code I have for routine compact/repair on the BE application to the FE application.

Thanks again!
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have had my own IT business for a very long time. I started mostly with hardware and after about a year started to notice a common theme. I had shelves with software boxes -- Peachtree, Quicken, Sage, Ouickbooks -- and yet most of my clients were…
Traditionally, the method to display pictures in Access forms and reports is to first download them from URLs to a folder, record the path in a table and then let the form or report pull the pictures from that folder. But why not let Windows retr…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…
The Relationships Diagram is a good way to get an overall view of what a database is keeping track of. It is also where relationships are defined. A relationship specifies how two tables connect to each other. As you build tables in Microsoft Ac…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question