by: Mitchell S. Honnert |
last post by:
Is there a way, given the full path of a folder on a network, that one can
programatically tell if you have Read access to that folder?
I have an application where the user is able to select a...
|
by: muskan |
last post by:
hello,
I want to give password when we open the enterprise manager .So that only the authorised users can access the database & see the tables .
Could u help me for solving this problem.
&...
|
by: gabry.morelli |
last post by:
Hi everybody,
I am creating an application with MS Access 2003, using a workgroup
file to manage user connections. I already created several groups in
the workgroup file and assigned them to the...
|
by: leela mn |
last post by:
Hi Everybody!!!
i have a situation where in i should allow users to access the website only once from a particular system..
so is there any way from which we can know all the windows open????
|
by: lilp32 |
last post by:
I need to connect to a password protected Access database through Excel.
Everything I've found while searching seems to imply that this is a bug that Microsoft has not fixed. Is this true? The...
|
by: ammounn |
last post by:
i'm publishing my vb 2008 application using an access database but the problem is after publishing it wont run and it display an error message that the database was not found although i added it in...
|
by: Redbeard |
last post by:
I need to save my Access 2010 database in 2003 format so that someone can use it that is only running 2003. My database was built using Access 1997 and has been upgraded over the years to 2003, 2007...
|
by: rahul2310 |
last post by:
I am hiding title bar and file button on it,because of which user can not compact and repair database.so want to create button on form using which user can compact and repair.
I tried code.
...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|