There are several different objects in the access database.
The access database has 7 different objects: "table", "query", "form", "report", "page", "macro" and "module"; among them, the table is the core object , mainly used to store data. These objects are each responsible for certain functions in the database and cooperate with each other to build a database.
The operating environment of this article: windows10 system, Dell G3 computer, Microsoft Office Access2019.
Related recommendations: "Access Tutorial"
In Access, the so-called building materials are the main objects in the database, which include "table" and "query" , "Form", "Report", "Page", "Macro" and "Module". These objects are each responsible for certain functions in the database and cooperate with each other to build a database.
1. Table - Table is the basic object of the database and the basis for creating the other five objects. Tables are composed of records, and records are composed of fields. Tables are used to store database data, so they are also called data tables.
Table is the core object of Access database, mainly used to store data. It is the basis for creating several other objects.
2. Query - Query can quickly find the required records according to the index, filter the records according to the requirements, and can connect the fields of several tables to form a new table.
3. Form (Form) - Form provides a convenient window for browsing, inputting and changing data. You can also create subforms to display the contents of associated tables. A form is also called a form.
4. Report - The function of the report is to classify and summarize the data in the database and then print it out for analysis.
5. Macro - Macro is equivalent to batch processing in DOS, used to automatically perform a series of operations. Access lists some commonly used operations for users to choose from, which is very convenient to use.
6. Page - is a special kind of WEB page that is directly connected to the data in the database. The data is published to the Internet or Intranet through the data access page, and the browser can be used to maintain and operate the data.
7. Module - The function of a module is similar to that of a macro, but the operations it defines are more detailed and complex than macros. Users can write programs according to their own needs. The module is programmed using Visual Basic.
In the database, "table" is used to store data; "query" is used to find data; people obtain data through "form", "report" and "page"; and "macro" and "module" ” is used to realize automatic operation of data. In fact, for a database, the most important function is to obtain data in the database, so the flow of data between various objects in the database has become what we are most concerned about. In order to be able to clearly arrange various structures when building a database in the future, you should first understand the functions and connections between objects in the Access database.
As a database, the most basic thing is to have a table and data stored in the table. For example, in the "address book" database, you must first create a table, and then enter someone's contact address, phone number and other information into the data table, so that there is a data source in the database.
After having these data, they can be displayed on the form. This process is to establish a connection between the data in the table and the controls on the form. This process is called "binding" in Access.
In this way, the data actually stored in the table can be obtained through various form interfaces on the screen. Moreover, reasonably placing controls and patterns on the form can make it easier for us to operate and understand the meaning of the data in the database.
In this way, the flow of data from the table to the form is completed, and the data in the database is communicated between the computer and the human. For example, in the "Address Book" database, use an automatic form to display a record in the database on the form, and control the record operation button on the form to move back and forth in the table, and you can see information corresponding to other records.
For more programming-related knowledge, please visit: Introduction to Programming! !
The above is the detailed content of There are several different objects in the access database.. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

1. Open settings in Windows 11. You can use Win+I shortcut or any other method. 2. Go to the Apps section and click Apps & Features. 3. Find the application you want to prevent from running in the background. Click the three-dot button and select Advanced Options. 4. Find the [Background Application Permissions] section and select the desired value. By default, Windows 11 sets power optimization mode. It allows Windows to manage how applications work in the background. For example, once you enable battery saver mode to preserve battery, the system will automatically close all apps. 5. Select [Never] to prevent the application from running in the background. Please note that if you notice that the program is not sending you notifications, failing to update data, etc., you can

DeepSeek cannot convert files directly to PDF. Depending on the file type, you can use different methods: Common documents (Word, Excel, PowerPoint): Use Microsoft Office, LibreOffice and other software to export as PDF. Image: Save as PDF using image viewer or image processing software. Web pages: Use the browser's "Print into PDF" function or the dedicated web page to PDF tool. Uncommon formats: Find the right converter and convert it to PDF. It is crucial to choose the right tools and develop a plan based on the actual situation.

The Java reflection mechanism allows programs to dynamically modify the behavior of classes without modifying the source code. By operating the Class object, you can create instances through newInstance(), modify private field values, call private methods, etc. Reflection should be used with caution, however, as it can cause unexpected behavior and security issues, and has a performance overhead.

Oracle can read dbf files through the following steps: create an external table and reference the dbf file; query the external table to retrieve data; import the data into the Oracle table.

Apple's latest releases of iOS18, iPadOS18 and macOS Sequoia systems have added an important feature to the Photos application, designed to help users easily recover photos and videos lost or damaged due to various reasons. The new feature introduces an album called "Recovered" in the Tools section of the Photos app that will automatically appear when a user has pictures or videos on their device that are not part of their photo library. The emergence of the "Recovered" album provides a solution for photos and videos lost due to database corruption, the camera application not saving to the photo library correctly, or a third-party application managing the photo library. Users only need a few simple steps

How to use MySQLi to establish a database connection in PHP: Include MySQLi extension (require_once) Create connection function (functionconnect_to_db) Call connection function ($conn=connect_to_db()) Execute query ($result=$conn->query()) Close connection ( $conn->close())

To handle database connection errors in PHP, you can use the following steps: Use mysqli_connect_errno() to obtain the error code. Use mysqli_connect_error() to get the error message. By capturing and logging these error messages, database connection issues can be easily identified and resolved, ensuring the smooth running of your application.

Yesterday, BotanixLabs announced that it has completed a total of US$11.5 million in financing, with participation from Polychain Capital, Placeholder Capital and others. Financing will be used to build the decentralized EVM equivalent of BTCL2Botanix. Spiderchain combines the ease of use of EVM with the security of Bitcoin. Since the testnet went live in November 2023, there have been more than 200,000 active addresses. Odaily will analyze Botanix’s characteristic mechanism and testnet interaction process in this article. Botanix According to the official definition, Botanix is a decentralized Turing-complete L2EVM built on Bitcoin and consists of two core components: Ethereum Virtual Machine
