To provide feedback on any of the articles, please enter your name, e-mail address and company (optional) below, add your comment and press the submit button. Thanks
System tables are used by Access to make databases function correctly. With a few exceptions, there is very little information available online about most of the system tables.
The purpose of this article is to summarise known information about Access system tables.
It is also an invitation to other developers to add to this pool of knowledge
Some system tables can be viewed & a few can be edited
However you should only do so ....IF YOU ARE ABSOLUTELY SURE WHAT YOU ARE DOING
Incorrectly editing system tables may corrupt your database or prevent you opening it
This article describes various tests done to compare different approaches to coding:
1. Handling nulls: Trim / Len / Nz
2. CurrentDB vs DBEngine(0)(0)
3. DoEvents vs DBIdle.RefreshCache
4. HAVING vs WHERE
5. Conditional Updates: If..ElseIf..End If / Select Case / Nested IIf / Switch / Lookup Table
6. Query vs SQL vs QueryDef
7. Check Record Exists
Example databases are provided so the tests can be done on your own workstations
If you found this site useful, please consider giving a donation to help offset the costs in keeping it running. Thanks.
This page contains links to some longer articles discussing specific issues in Access in greater detail.
It is intended that the number of articles will be significantly increased in the coming months so please check back again regularly.
There are many things that developers can do to improve the security of their applications (both design & data). However, no Access database can EVER be made 100% secure. A capable and determined hacker can break any Access database given sufficient time and determination.
The older MDB / MDE file format is FAR LESS SECURE than the newer ACCDB / ACCDE format. Whilst this is hardly news to many developers, I’ve had a few requests to provide more details to justify this statement.
During development work, all of us will want to ensure that tasks are completed as quickly as possible. However, it is not always obvious that the current design is inefficient until performance slows to a crawl and clients start to complain.
Where queries or VBA SQL statements are concerned, help is available by making use of the ShowPlan feature which is available with both the JET database engine (up to A2003) and the newer ACE engine (A2007 onwards). The ShowPlan option prints the query's plan to a text file so you can review and, if possible, improve the design.
The purpose of this article is to provide more details about the ShowPlan feature for which little documentation is available online
This article summarises many of the actions that all Access developers should do when deploying databases in a multi-user environment.
These will significantly reduce the risk of data corruption as well as minimising the possibility of data being misused or stolen
Multivalued fields (MVFs) were a new feature introduced with Access 2007
This article explains what MVFs are and how they can be used.
Although often attractive to new users, most experienced developers avoid them completely.
This article explains why this feature is really not a good idea
Access allows you to use lookup fields at table level.
Doing so, allows you to have combo boxes to guide end users with a list of available choices
Although at first sight this may seem an attractive option, experienced developers normally advise against their use. Arvin Meyer described several of the reasons against their use in The Evils of Lookup Fields in Tables
This article describes another issue - exporting lookup field data to Excel
SECTION BELOW NOT CURRENTLY IN USE ...
This article explores some of the causes of the 'dreaded' write conflict error and how to deal with those issues.
Possible causes include:
a) Two or more users are trying to edit the same data at the same time
b) Editing data that uses multiple forms that have the same record source
c) Boolean fields in linked SQL Server tables with no default value
This article explores some of the methods that can be used to synchronise data with an external source. The advantages and disadvantages of each method are also discussed.
This article explores the different types of select query joins available in Access and how these affect the query output in each case:
a) Inner Join
b) Left Outer Join
c) Right Outer Join
d) Union Query (AKA Full Outer Join)
e) Cartesian Join (AKA No Join)
In addition it discusses the causes of ambiguous join errors and how to solve these
This article explains how the column history property can be used to show a history of changes made to memo / long text fields.
The article also explains how this data is stored in a deep hidden system table and how to deal with issues associated with editing the column history
This article explains how Access uses the MSysQueries system table in conjunction with other system tables to display the query structure in the query design window.
This article describes the differences between query joins and table relationships and explains the important use of table relationships to enforce referential integrity.
Three methods of adding relationships are discussed. In addition, the article explains how Access uses the MSysRelationships system table to store the relationships that have been applied