Solved

find in access table when string contains "["

Posted on 2014-10-01
7
163 Views
Last Modified: 2014-10-01
I am having trouble finding then filtering on:

sDesc
[Prof
Auto[Pro
Auto[Prof
Prof
Pro
Professional

where the string contains the "[" or "]" it wont search properly

it says the pattern string is invalid. there is no error code with this given


how do i overcome this?
0
Comment
Question by:PeterBaileyUk
  • 4
  • 3
7 Comments
 
LVL 48

Expert Comment

by:Rgonzo1971
ID: 40354229
Hi,

please try

Like "*[[]*"

Regards
0
 

Author Comment

by:PeterBaileyUk
ID: 40354243
can i do that in the cntl f find box for testing?
0
 
LVL 48

Accepted Solution

by:
Rgonzo1971 earned 500 total points
ID: 40354256
I don't think so

SELECT Table1.Field
FROM Table1
WHERE Table1.Field Like "*[[]*";
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:PeterBaileyUk
ID: 40354449
can it flip the other way around for
sDesc
Med]
Med
0
 

Author Comment

by:PeterBaileyUk
ID: 40354458
what is the significance of the two closed brackets together? []
0
 
LVL 48

Expert Comment

by:Rgonzo1971
ID: 40354480
it is the opening bracket between an opening and a closing bracket

Siehe  link

Matches any single character within the brackets.

https://support.office.com/en-US/Article/Access-wildcard-character-reference-af00c501-7972-40ee-8889-e18abaad12d1?ui=en-US&rs=en-US&ad=US

for closing bracket use

SELECT Table1.Field
FROM Table1
WHERE Table1.Field Like "*]*";
0
 

Author Closing Comment

by:PeterBaileyUk
ID: 40354665
brilliant thx
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In Debugging – Part 1, you learned the basics of the debugging process. You learned how to avoid bugs, as well as how to utilize the Immediate window in the debugging process. This article takes things to the next level by showing you how you can us…
I originally created this report in Crystal Reports 2008 where there is an option to underlay sections. I initially came across the problem in Access Reports where I was unable to run my border lines down through the entire page as I was using the P…
Learn how to number pages in an Access report over each group. Activate two pass printing by referencing the pages property: Add code to the Page Footers OnFormat event to capture the pages as there occur for each group. Use the pages property to …
What’s inside an Access Desktop Database. Will look at the basic interface, Navigation Pane (Database Container), Tables, Queries, Forms, Report, Macro’s, and VBA code.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now