Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Validation Rule

Posted on 2014-09-03
4
198 Views
Last Modified: 2014-09-03
Experts, in a validation rule, can I refer to field within the table?   I am referring to [Type] within the field  [ExpectedDisbRecdDate].  Not sure if a rule like this is better placed in a form.

for example:

if [type] = "JBIC",>Date()+30,<Date()+25
the error I get is "enclose text data in quotes"

thanks

ValidationRule
0
Comment
Question by:pdvsa
  • 3
4 Comments
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 40301454
not really sure what you are trying to accomplish here, but,

try something like this

IIf([type]="JBIC",>Date()+30,<Date()+25)
0
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 40301469
if you are using A2010 or greater, data macro may work for you..
0
 
LVL 120

Accepted Solution

by:
Rey Obrero (Capricorn1) earned 500 total points
ID: 40301487
just tried what you have in a table and i am not surprise that it will not accept the entry in the validation rule property..

perhaps use the validation or setting the values of the Datefield using a form.
0
 

Author Closing Comment

by:pdvsa
ID: 40301498
thank you.  I will try the validation rule at the form level.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question