If you are not already logged in to Northwind, click the Login button.Īn Access database consists of the following objects: tables, queries, forms, reports, macros, and modules. This section shows you how to set up your window so that it matches the example. The Access window used in this example has been set up to make it easier to explain. If you want to trust subfolders, select The Subfolders Of This Location Are Also Trusted. Enter the path to the location you want to trust, or click Browse to locate the folder.The Microsoft Office Trusted Location dialog box appears. Click Access Options in the bottom-right corner.Databases stored in trusted locations do not require you to enable security. If you know a database is safe, you can store it in a trusted location. If you are enabling the Northwind database, the Login dialog box appears. The Microsoft Office Security Options dialog box appears. You may need to enable the Northwind database. If you know a database is trustworthy, you can perform the following steps to enable it. Access has security settings that disable code and display a security warning when you open a database. It is possible for an Access database to contain malicious code, such as a computer virus. Access creates the Northwind database and opens it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |