by: xmp333 |
last post by:
Hi,
I created an Access XP database, and then disabled all the menus that
allowed users to modify report design, etc... (I'll call them
administrative features). Users were only able to use...
|
by: icb |
last post by:
Hi I have a front-end/back-end setup. The front-end utilises all
unbound forms populating the back-end via the code I have written. All
fine so far.
Prior to splitting the database I ran the...
|
by: Chris Tyson |
last post by:
My problem is this:
I have created a database, using Workgroup security features. Unique
Workgroup. New users added. Permissions to Admins, Admin, and Users revoked.
'Ownership' of database...
|
by: Paul T. Rong |
last post by:
A card where I wrote my name and WID (work group ID) was stolen
(unfortunately together with other things), therotically the one who have my
name and WID can create the same mdw file which I use...
|
by: Dom |
last post by:
Hi,
I have a problem in getting Access 2002 to read my workgroup file.
I've created different groups and users and when the db is opened the
user is prompted to enter a username and password...
|
by: L Quinn |
last post by:
I created a workgroup file by using the Security Wizard. The Workgroup
file Secure.mdw was deleted and I can't get onto the system. Luckily
no one else had joined the workgroup so there is only me...
|
by: TechBoy |
last post by:
I am trying to learn on the fly about Access Security for an app we are
developing. I realize Access security is an advanced subject with many
details. I wanted to share a scenario and ask a...
|
by: google |
last post by:
I have a few general questions. I am working on a new database to be
used within my company. I would like to give a couple of people,
particularly HR, the ability to add and delete Access users,...
|
by: Edmund |
last post by:
I hope someone can help me out set up the security properly.
I have Microsoft Access 97 and Access 2000 in my computer and I developed my
database with Access 2000 with the updated patch...
|
by: siewong |
last post by:
Existing Access Database Troubleshooting
I am new to access database and inherited an access application and
all users who were previously able to use this access file
simulataneously are now...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|