• Complain

Ken Bluttman - Access Hacks

Here you can read online Ken Bluttman - Access Hacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2005, publisher: OReilly Media, Inc., genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ken Bluttman Access Hacks
  • Book:
    Access Hacks
  • Author:
  • Publisher:
    OReilly Media, Inc.
  • Genre:
  • Year:
    2005
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Access Hacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Access Hacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

As part of the Microsoft Office suite, Access has become the industrys leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks from OReilly.This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the programs various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the programs most productive features.A smart collection of insider tips and tricks, Access Hacks covers all of the programs finer points. Among the multitude of topics addressed, it shows users how to:work with Access in multi-user environments utilize SQL queries work with external data and programs integrate Access with third-party products Just imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else.Part of OReillys best-selling Hacks series, Access Hacks is based on author Ken Bluttmans two decades of real-world experience in database programming and business application building. Its because of his vast experiences that the book is able to offer such a deep understanding of the programs expanding possibilities.

Ken Bluttman: author's other books


Who wrote Access Hacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Access Hacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Access Hacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Index
[]ADOX libraryappendingrecordsapplicationsthird-partyAutoNumber field
Index
[]browsers
Index
[]cascadingupdatescodecontrolslistboxescreatingtables
Index
[]data changesdatabase windowdatabasesdatesdeletingdialog boxesdomain aggregate functions
Index
[]enteringtextentering texteventsExcelExcel dataimportingexportingexpressions
Index
[]fieldsAutoNumberformsfunctions
Index
[]
Index
[]HTML
Index
[]importingExcelinserting
Index
[]joins
Index
[]
Index
[]listboxes
Index
[]macrosAutoExecmany-to-many relationshipsMouseMoveOnTimermultiple usersMySQL
Index
[]number fields
Index
[]objectsOn Timer eventOnTimerMouseMoveoperatorsOutlook
Index
[]personalizationpopulatingsortingpreferencesproperties
Index
[]queriesquery grid
Index
[]recordsseparate sortedsortingrelationshipsmany-to-manyreports
Index
[]scrollingsecurityshortcutssplit dataSQL Serversums
Index
[]
Index
[]tablescreatingtestingtextthird-partyapplicationsthird-party applicationsto XMLexportingtriggers
Index
[]Union queryupdatesusers
Index
[]valuesVBAviewing
Index
[]wizardsWord
Index
[]XML
Index
[]
Index
[]ADOX libraryappendingrecordsapplicationsthird-partyAutoNumber field
Hack 9. Work with Any Amount of Data

Picture 1Picture 2

Plan a multiple-database architecture to house any amount of datagigabytes, even terabytes!

The only size limit in Access is that a table can't contain more than 1GB of data. Well, if that's it, there is a lot of opportunity here. Access isn't cut out for incredibly large stores of data, granted, but that's not the point. If SQL Server or Oracle isn't going to be installed at your place of business for another year, take advantage of Access's flexible architecture to work with any amount of data.

The technique is simply to make a plan for how to structure the data among multiple database files and tables. There is no rule that says an Access application must reside completely in a single Access file. An Access application can be split into a front end and a back end. That is, the forms, reports, and queries stay in the front end, and the data itself is put into a separate file. The data tables are then linked to the front end. This is standard fare, the quintessential client/server in its simplest execution, shown here in .

Figure 1-19. A simple front-end/back-end configuration
1101 Splitting Up Data There is no reason to be limited to a single file on - photo 3
1.10.1. Splitting Up Data

There is no reason to be limited to a single file on the back end. The organization of and facts about the data will drive the decisions concerning how it can be parsed into smaller data stores. For example, if you are shows such a configuration.

Figure 1-20. Using multiple databases on the back end
An alternative is to split a customer list by city state province or other - photo 4

An alternative is to split a customer list by city, state, province, or other geographic delimiter. Again, this allows you to take an overwhelmingly large set of data and turn it into manageably smaller (albeit still large) stores of data.

Splitting the data is the key to this hack. Analyze the data, and come up with a game plan. Perhaps the data is date-based. You can split it up by month, day, or whatever makes sense.

1.10.2. Working with Split Data

There is an unwelcome side effect to splitting data. In a relational system, you lose the simplicity of relying on the established relationships when data is split out to additional tables. Picture this: you have a master table of customers and a related table of customer purchases. You split the customers into 10 smaller tables. What happens to the relationship? You can work around this problem in two ways.

One way is to relate the purchases table to all 10 master tables. The other is to leave out the relationships altogether and instead incorporate behind-the scenes processing to wed data back together as needed by front-end activity.

This isn't as complicated as it might sound. In a nutshell, VBA and ADO work together to find customers and purchases that match based on whatever criteria are being selected in the front end. A workable approach to find purchases that match a criterion is to create a recordset or array of records from the purchases table, and then run these records against the 10 customer tables while looking for a match on the key fields. No, this isn't an eloquent or particularly efficient way of processing data. However, it enables Access to work with gigabytes or more of data, and that is the measure of success in this case.

Hack 10. Find Database Objects in a Snap

Picture 5Picture 6

Use the description property to prevent users from being overwhelmed by sifting through cryptic-sounding forms, queries, and reports.

Many of us follow naming conventions when creating database objects. Among the developer community, we have come to recognize and take for granted that tbl, frm, rpt, and other prefixes are part and parcel of our work. For example, tblStaff is a table, frmAdmin is a form, and rptContacts is a report.

However, when you complete a database with several objects that are named in this way, it's a challenge to the average database user to understand the names. shows a perfect example of a database with several forms.

There is a way to resolve this dilemma, and it doesn't mean developers have to change their naming habits. All database objects can be given a description. The best thing is that you can enter descriptions for objects directly in the database window without having to open an object in Design mode.

In the database window, just right-click an object, and from the menu that appears, click Properties. A small dialog box opens for you to enter a natural-sounding description, as shown in .

After you enter is now understandable.

Figure 1-21. Cryptic form names that can stump a user
Figure 1-22 Entering a description A neat thing about this approach is that - photo 7
Figure 1-22. Entering a description
A neat thing about this approach is that you can even use a warning message so - photo 8

A neat thing about this approach is that you can even use a warning message so that users know not to open an object. This is particularly helpful in the case of subforms. Users shouldn't open subforms directly because they appear inside other forms. The description tells users not to open them.

Figure 1-23. Selecting a form by its description
Kirk Lamb Hack 11 Use a Junction Table Correctly model a many-to-many - photo 9
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Access Hacks»

Look at similar books to Access Hacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Access Hacks»

Discussion, reviews of the book Access Hacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.