Solved

access query

Posted on 2014-01-28
6
229 Views
Last Modified: 2014-01-28
I would like to find strings that do not start with any letter from a to z in the thrid position

JS13G111 would need the 3 removed
JS16G111 woul;d need the 6 removed and so on

not sure how to do that.

am working in query grid of access 365
0
Comment
Question by:PeterBaileyUk
  • 3
  • 2
6 Comments
 
LVL 19

Expert Comment

by:MINDSUPERB
ID: 39814403
You may try this:

Needed: Left([TestField],3) & Right([TestField],4)

Sincerely,

Ed
0
 
LVL 19

Expert Comment

by:MINDSUPERB
ID: 39814406
This may not be the solution you want but this is what I think the quickest approach. See the image attached.

Sincerely,

Ed
sample.jpg
0
 

Author Comment

by:PeterBaileyUk
ID: 39814420
flipping the test cases this:
this                        became this
JS1BG112        JS1G112

in this case it should have done nothing

JS16R7DB    

Instead of removing the character could it just flag the issue

JS16R7DB  so it would say here

numeric exists in 4th position
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 49

Accepted Solution

by:
Rgonzo1971 earned 500 total points
ID: 39814423
Hi,

pls try

Expr: IIf(Not (IsNumeric(Mid([Field1],4;1))),[Field1],Left([Field1],3) & Right([Field1],Len([Field1])-4))

Open in new window

Regards
0
 

Author Comment

by:PeterBaileyUk
ID: 39814429
I was jsut experimenting with similar: Expr3: IsNumeric(Mid([expr1],4,1))
0
 

Author Comment

by:PeterBaileyUk
ID: 39814437
corrected the small typo ";" in mid but works a treat thankyou
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Experts-Exchange is a great place to come for help with solutions for your database issues, and many problems are resolved within minutes of being posted.  Others take a little more time and effort and often providing a sample database is very helpf…
A simple tool to export all objects of two Access files as text and compare it with Meld, a free diff tool.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now