Access hacks

As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typi...

Descripción completa

Detalles Bibliográficos
Autor principal: Bluttman, Ken (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Sebastapol, California : O'Reilly 2005.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627159806719
Tabla de Contenidos:
  • Access Hacks; Credits; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; Safari Enabled; How to Contact Us; Got a Hack?; 1. Core Access; 1. Help Users Find the Objects They Need; 1.2.2. Using Groups; 2. Personalize Your Access Application; 1.3.2. Applying the Preferences; 1.3.3. Using the Hack; 3. Work Fast and Avoid Typos; 1.4.2. Remember Where to Reference Shortcuts; 4. Optimize Data Changes; 5. Transfer Data Between Versions of Access; 6. Organize and Enhance Your Macros
  • 1.7.2. Creating Macro Groups7. Rid Your Database of Clutter; 1.8.2. Identifying Unused Objects; 1.8.3. Hacking the Hack; 8. Protect Valuable Information; 1.9.2. The Code; 9. Work with Any Amount of Data; 1.10.2. Working with Split Data; 10. Find Database Objects in a Snap; 11. Use a Junction Table; 12. Stop the Database from Growing; 2. Tables; 13. Create an AutoNumber Field with a Custom Value; 2.2.2. Hacking the Hack; 14. Copy Data Between Tables Without an Append Query; 2.3.2. Appending Across Databases; 15. Steer Clear of System Tables; 2.4.2. Running the Code
  • 16. Hide Sensitive Information2.5.2. Hacking the Hack; 17. Simulate Table Triggers; 2.6.2. Checking Out the Form Events; 2.6.3. The Code; 2.6.4. Running the Code; 2.6.5. Hacking the Hack; 18. Create Tables Faster; 2.7.2. The Code; 3. Entry and Navigation; 19. Help Users Navigate Through Long Forms; 3.2.2. The Code; 20. Help Users Enter Additional Text; 21. Let Users Add Custom Items to Predesigned Lists; 3.4.2. Hacking the Hack; 22. Populate and Sort Lists with Flair; 3.5.2. Populating a Listbox Alphabetically from Two Sources
  • 3.5.3. Controlling the Sort in a Listbox Populated from Multiple Sources3.5.4. Sorting List Items by Popularity; 23. Use Custom Controls on Your Forms; 3.6.2. See Also; 24. Confirm Record Updates Before Saving; 25. Put a Clock on a Form; 3.8.2. Hacking the Hack; 26. Be Tab-Smart; 27. Highlight the Active Control; 4. Presentation; 28. Separate Alphabetically Sorted Records into Letter Groups; 4.2.2. Hacking the Hack; 29. Create Conditional Subtotals; 4.3.2. Hacking the Hack; 4.3.3. See Also; 30. Use Conditional Formatting to Point Out Important Results
  • 4.4.2. Conditional Formatting the VBA Way31. Provide a Direct Link to a Report; 4.5.2. Printing a Report and Closing the Database in One Click; 32. Protect Intellectual Property; 4.6.2. Using the Watermark; 33. Create a Slideshow in Access; 4.7.2. The Form Design; 4.7.3. The Code; 4.7.4. Hacking the Hack; 34. Play Videos in Access Forms; 4.8.2. Playing a Movie; 4.8.3. See Also; 35. View Reports Embedded in Forms; 4.9.2. Hacking the Hack; 36. Put Line Numbers on a Report; 37. Shade Alternating Lines on a Report; 4.11.2. The Results; 4.11.3. Hacking the Hack
  • 38. Save Paper by Reducing Whitespace