Explain about the various features present in ms access, Computer Engineering

Microsoft access has vast advantages for a programmer and end user. Some of the advantages are

? Relative compatibility with SQL and VBA.

? Microsoft SQL server desktop engine is fixed into the Access suite along with Jetdata base engine which can further help you in programming.

? MS Access permits forms to have data which is altered as changes are made to the underlying table.

? It has features which support the creation of all objects in the underlying server.        

 

 

Posted Date: 4/4/2013 12:45:43 AM | Location : United States







Related Discussions:- Explain about the various features present in ms access, Assignment Help, Ask Question on Explain about the various features present in ms access, Get Answer, Expert's Help, Explain about the various features present in ms access Discussions

Write discussion on Explain about the various features present in ms access
Your posts are moderated
Related Questions

Using Module-Instance Parameter: Parameter values can be overridden while a module is instantiated. New parameter values are passed at the time of module instantiation. Top-

Q. Explain the Use of functions in parallel programming? include "pvm3.h" main() {    int cc, tid, msgtag;    char buf[100];    printf("%x\n", pvm_mytid());

What is the draw back of micro programmed control? It leads to a slower operating speed because of the time it takes to fetch microinstructions from the control store.

Q. What is Pure semiconductors? Pure semiconductors, known as intrinsic semiconductors, have very few charge carriers and may hence be classified as almost insulators or very p

How many responses does a computer expect to receive when it broadcast an ARP request? Why? An ARP (Address Resolution Protocol) request message is put in a hardware frame and

Define Operation code. The Operation code of an instruction is a group of  bits that explain such operations as add, sub, ,shift, mul and complement.

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

The following switching functions are to be implemented using a Decoder f 1   = ∑ m(1, 2, 4, 8, 10, 14)   f 2   = ∑ m(2, 5, 9, 11)   f 3   = ∑ m(2, 4, 5, 6, 7) The minimum configur

In how many ways line of code of assembly language can be divided? A line of code of an assembly language program can be divided in three columns called as fields. The fields d