Solved

MS Access Marco

Posted on 2014-02-21
5
409 Views
Last Modified: 2014-02-21
Hi,

See attached. I used to know how to do this, but it's been years..........

I want to take the marco opened in design view (LSS_EXTR_Cust-actv), add some fields from the same table & do a "save as" with a different macro name.

I DO NOT want to modify the existing macro.

How do I do that?

I'm not sure of the Access version (it looks old).

Thanks
AccessMacro.jpg
0
Comment
Question by:Richard Korts
  • 2
  • 2
5 Comments
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 39877894
for your information, what you want to alter is a query.
to create a copy of the query, select the query and do a right click , select copy then paste
give the query a new name.

now, open the new query in design view and add the fields then save
0
 
LVL 75

Accepted Solution

by:
DatabaseMX (Joe Anderson - Access MVP) earned 500 total points
ID: 39877896
First ... on the File menu at the top of Access:

File>>SaveAs
Enter your new name.

Now make the changes ... the File>>Save

done.
0
 

Author Comment

by:Richard Korts
ID: 39878185
Great, thanks.

How can I tell if this macro (or ANY Macro) is an "Autoexec" macro.?

I will need to make the new one the Autoexec macro (eventually) and of course turn off the old (current) one.
0
 
LVL 75
ID: 39878191
If it's a real auto exec macro ... it will actually have the name:

AutoExec


no more, no less :-)

Access looks for that exact name when loading, and if found - executes whatever commands are in that macro.
0
 

Author Closing Comment

by:Richard Korts
ID: 39878252
I see how they did it; there is no AutoExec macro, they open the database by executing a .bat file that has this line:

"C:\Program Files\Microsoft Office\Office11\MSACCESS.EXE" "C:\C_LSS\DB\Linked_to_LSS.mdb"  /x "LSS_MACR_Mo-1"

"LSS_MACR_Mo-1" is a macro that executes a query that does what I need.

Thanks!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
Familiarize people with the process of utilizing SQL Server functions from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Ac…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question