Hi
Is there any way to walk thru memory to find a variable that holds a
reference to a recordset that has been left open? (I use ADO for my
recordsets.)
The reason I want this info:
I am writing code to compact back end files.
If all recordsets, bound forms, combo boxes, etc are closed, the lock
file for each back end db should be automatically deleted (is this
correct?). If so, I can compact the back end databases from the front
end using the compactdatabase method.
However, I close all my forms, but still one of the lock file lingers
on.
The only reasonable hypothesis, seems to me, is that a recordset has
inadvertently been left open. Is this so? And how to discover the
rogue variable and correct the code that left it open... or do I have
to plod my way thru all my ugly code?
At present I have to do the compact and repair in the startup
procedure of the app, which will add to startup times, so not ideal.
Regards
Andrew Wrigley 2 1643
if you have links to the tables in the BE....there is your lock.
try to compact from an external application
Thanks the good intentions, but sorry, you are wrong.
The links to the BE will only cause an .ldb file to be opened IF there
are bound forms currently open that use the linked tables.
My problem is that the links are left open EVEN after closing all
bound forms.
In fact, I have solved the problem by plodding thru the code. For
reasons that escape me, a sub that I used to modify the sql of a query
using adox was causing the problem.
I changed the code to use ado, and all is now as expected. However,
in the UK Access User Group someone said that they had the reverse
problem, ie, when they changed from dao to adox the problem went away.
Ah, well, if this job was easy I would be paid less.
Thanks all the same.
Andrew Wrigley This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Steve Marciniak |
last post by:
I'm trying to display different recordsets (which are 1 field each) as
columns right next to one another. For example, Recordset1 is
displayed on the left hand side of the screen. Recordset2 is displayed
immediately to the right of then first recordset with the first rows
or each at the same level. Recordset3 is displayed to the right of
Recordset2 and so on. There is no set limit to the number of possible
recordsets (or columns to...
|
by: Sascha |
last post by:
Hi
I need some help on achieving the following:
I wrote a querie which collects Data out of three Tables, the Result
looks like this:
SET NOCOUNT ON
DECLARE @ROW INT
|
by: Stuart |
last post by:
Hi there,
I am trying to populate the array "yourImages" in the following code,
http://www.javascriptkit.com/script/script2/preloadimage2.shtml
except i am trying to fill it with the values from an access database.
I already publish info from the database to an asp page, but i would like to
preload the images.
I open the database successfully like this
---------------
|
by: Sean O |
last post by:
Is there a way to browse in the VB editor or run some code to help me
find any unwanted opend recordsets or open variables?
Thanks,
Tony
|
by: ambika |
last post by:
Hello,
Am not very good with pointers in C,but I have a small doubt about
the way these pointers work..
We all know that in an array say x,x is gonna point to the first
element in that array(i.e)it will have the address of the first
element.In the the program below am not able to increment the value
stored in x,which is the address of the first element.Why am I not
able to do that?Afterall 1 is also a hexadecimal number then...
| |
by: Steffen Fiksdal |
last post by:
I have programmed a library which offers an API which takes both
'const char*' and 'char**' pointers as input parameters.
An example:
extern int apicall( int sessioncontext,
const char* input,
char** output );
This method will use the input data, do some processing, allocate memory
|
by: Randy Harris |
last post by:
I was inspired by the recent discussion of returning multiple recordsets to
ADO from a stored procedure. (Amazed is probably more accurate). I asked
about how to accomplish same with Oracle and got a nudge in the right
direction from Mr. Kreft. I promised to provide details once working, so
here it is.
The code is shown below. My next step is to build this technique into my
application. I'm hoping for substantial performance gain.
...
|
by: rdemyan via AccessMonster.com |
last post by:
Can someone help me with creating code that will look for DAO recordsets in
modules and then check to see if the recordset is also closed in the module.
All of my recordsets are of the form rs* where * is a wildcard for letters
after rs.
Thanks.
--
Message posted via AccessMonster.com
|
by: convexcube |
last post by:
Hi Experts,
I have a unbound form which records details of complaints. It also records what products are affected in the complaint. These are stored in a table named ComplaintProducts that has the fields: ComplaintProductsIndex (Autonumber), ComplaintIndex & ProductName.
The product list is quite lengthy, so I have set up a separate form which opens when the Products Affected list box on the Complaints form is double clicked, containing a...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
| |
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |