By creating the first database in Access, novice developers usually build applications that consist of a single database file, that is, tables and forms are located in the same file mdb. However, Access allows you to create applications in addition to local and network. The simplest case is the split database, which includes two files mdb: first - file data objects (there are tables), second - file objects application (it kept all the other objects - forms, queries, reports and access pages data, macros and modules VBA). It is in your application objects to link with tables stored in a file data objects.
The division of the database has the following advantages:
As a single environment, you can upgrade facilities application without affecting the existing data. In this application is updated just replace the file objects applications. The alternative may be a way: Imagine that you have installed undivided database, users have begun to work with it, and constantly and then you give the job that any change: to make a new record, request, etc. have to kick users who sit for machine do the work. And all this time base will not work. Of course, this situation is not real. Real, that probably feed on your work than stop production. Therefore, even single-base to do better separated.
In a multi-user environment with the same data can work together all the users applications, because file data objects placed on the file server. As a file server can be a shared folder (with open access for all) in which objects are placed file data (database tables).
I hope that over the appropriateness of the division of the database no doubt. Now decide on how to do it. There are two options:
make new blank database, Hit in the window of the right button, select the shortcut menu «Import» or «File - External data - import», and continue to dialogue. As a result, the base will be imported (copied) table. To remove a table from the database, from which made imports, and connect it to the tables of new facilities.
doing the division base with the help of the master: «Tools - Utilities - the division of databases» continue to dialogue.
Connecting to the same «service» (base tables) is very simple - Hit the right button in the window base objects applications (where the form and everything else), select the shortcut menu «Relationship with tables» or «File - External Data - Communications Table »continue to dialogue. As a result, our base will label tables, and marked with arrows on the left, which means that the tables outside. Limitations with such tables - do not change their structure (add, edit fields, etc.) in the database. It may be only one where they set up (are).
Even better, if we decided to base the split, with design immediately set up two base mdb: a place in the table, the other everything else.
So, the base is divided. I recall, the main advantage of the division - the possibility of establishing a network application. Imagine: in one of the network of computers creates a folder «base», open to the public access (must be the same access to the disk on which you installed Access, usually «S»), and placing a file object data (database tables ). On the other host computers, copy files, objects applications (database with forms, reports, etc.) and plug them into our «service». Get network application - many users enter data in one database. Such an application is called «file - server», as well as «server» supports file data objects.
But let us assume, for whatever reason the location of «server» changed - folder «base» move. As soon as users start their applications, they have a message that the table is not found. In this case, Hit the right button on the label table in the annex of users, select the shortcut menu «manager of tables», mark those tables, the way that you need to update or Hit «Select all», then «OK» to continue to dialogue.
Статьи по теме:
Electrostatic Plotters Tracing processes in UNIXWhat is the standard CompactPCI?Downloading multiple operating systemsComputer virusWhat is the codec and where they can be downloadedActive Desktop Windows XPThe attack at Infinity Gb V2 2 Threats to Security Modern NetworksThe program 1S Accounting Enterprise 8Windows 7 - Window to the FutureConcentrators Ethernet NetGearThe choice of the video Time to create protection Spam and how to cope with it Linux: Gentoo Vs Ubuntu FunctionalityTYPES LKSThe total points in the organization LANFraud Cell Phones Computer data as an object of criminal assaultIncreases user rights Free Internet Or How to Become a HackerBasics With VirtualdubRequirements for computer technology The truth of the activation of Windows Vista Inkjet Plotters (SP, INK-JET PLOTTER)New Decision on the market SoaWith your husband talking about your computer?Best Antivirus Computer technology and GenealogyZao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008Development of Iron Industry Or Who Wanted Now Multi ProcessorsSoftware for businesses - to add efficiency to business COMPUTER CRIME PREVENTIONLegal and technical documents Playing audio and video filesBlack Banner - History of discovery Fresh version of Mobile Forex 2.16: Quick Mobile TradingRobot Tartalo knocking at your doorHackers can control a PC without the knowledge of their owners Why is cleaning Windows registry neededOffice automationLaw Bezopasnosti Completed work on setting up a new product Alee Archive 3 for work with DBMSHISTORY OF BUILDERSLASER (LED) Plotters Enabling Windows VistaMacromedia Dreamweaver against Microsoft placed on the first lane Hackers, as the subjects of computer crime What your child is doing online?At the market goes cheap GSM / GPS signaling Tips software and programs connected branch Systemic and local bus PRINCIPLE OF CONSTRUCTION OF COMPUTER NETWORKSThe physical medium for LANs