Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Creating a Log of changes made (1)

Posted on 2014-01-22
3
Medium Priority
?
207 Views
Last Modified: 2014-02-08
Hi all,

my initial inquiry in essence is the following.

I have a table with data.

I have a form which allows amendments to certain fields of this table. Other fields are locked so that the user cannot amend.

I was wondering if it is possible to create a log of the changes made to those allowable fields?

[working with MSAccess 2003]
0
Comment
Question by:PipMic
  • 2
3 Comments
 

Accepted Solution

by:
marlind605 earned 300 total points
ID: 39800670
Try this function in Allen Browne's website. Looks complicated at first but just follow the steps.http://allenbrowne.com/appaudit.html
0
 

Author Comment

by:PipMic
ID: 39806629
Hi,

found this one which is far simpler but dont know if it works on 2003. Must test.
0
 

Author Closing Comment

by:PipMic
ID: 39843816
Difficult to implement
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post, I will showcase the steps for how to create groups in Office 365. Office 365 groups allow for ease of flexibility and collaboration between staff members.
MS Outlook undoubtedly is the most widely used email client.Its user-friendliness, cost effectiveness, and availability with Microsoft Office Suite make it the most popular email application.  Its compatibility with Microsoft applications like Exch…
The viewer will learn how to  create a slide that will launch other presentations in Microsoft PowerPoint. In the finished slide, each item launches a new PowerPoint presentation and when each is finished it automatically comes back to this slide: …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question