Installing Your Microsoft Access Database (Manual Installation Instructions)

Similar documents
End User License Agreement

1. License Grant; Related Provisions.

Workshop 4 Installation INSTALL GUIDE. Document Date: February 4 th, Document Revision: 1.1

AhnLab Software License Agreement

FLUENDO GENERIC EULA

Setup guide Automatic tool measurement on AKKON CNC system

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT

END USER LICENSE AGREEMENT PANDA ANTIVIRUS 2007 / PANDA ANTIVIRUS + FIREWALL 2007 / PANDA INTERNET SECURITY 2007

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB

Site Impact Policies for Website Use

DATASHEET 4D SYSTEMS. 4D Raspberry Pi Serial Adaptor TURNING TECHNOLOGY INTO ART. 4D-Serial-Pi-Adaptor

TN010 AKKON. Installation guide. (AKKON application documentation and operating system)

DATASHEET 4D SYSTEMS. 4D Raspberry Pi Serial Adaptor TURNING TECHNOLOGY INTO ART. 4D-Serial-Pi-Adaptor

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

DATASHEET 4D SYSTEMS. 4D Raspberry Pi Serial Adaptor TURNING TECHNOLOGY INTO ART. 4D-Serial-Pi-Adaptor

DATASHEET 4D SYSTEMS. 4D Arduino Adaptor Shield TURNING TECHNOLOGY INTO ART. 4Display-Adaptor-Shield

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

4D Systems. Application Note: 4D-AN-G3001. in ViSi Environment. Document Date: 15 th December Document Revision: 1.0

End User Licence. PUBLIC 31 January 2017 Version: T +44 (0) E ukdataservice.ac.uk

Terms and Conditions of Website Use

Policies & Medical Disclaimer

INCLUDING MEDICAL ADVICE DISCLAIMER

Entrust WAP Server Certificate Relying Party Agreement

Entrust SSL Web Server Certificate Subscription Agreement

TERMS AND CONDITIONS

MULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

Firstly, to perform the following actions, you must have Admin Rights on your PC.

Funding University Inc. Terms of Service

You may use the Service to either access, establish or change the following:

Player Loyalty Program Terms & Conditions

MULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide

MyCreditChain Terms of Use

Stellar WAB to PST Converter 1.0

DATASHEET. 3.2 Display Bezel. 4D-Bezel-32 For the ulcd-32ptu Display Module. Document Date: 16 th September 2013 Document Revision: 1.

Daniel MeterLink Software v1.40

The Travel Tree Terms and Conditions

Webfont License End User License Agreement (EULA)

DATASHEET. gen4 Programming Adaptor For all gen4 sizes (Picaso and Diablo16) gen4-pa. Document Date: 29 th January 2016 Document Revision: 1.

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com

Beta Testing Licence Agreement

ESS Utility Android App User Guide

SMS SERVICE PROVISION

Oracle Binary Code License Agreement for Java Secure Sockets Extension for Connected Device Configuration 1.0.2

HP Limited Warranty Statement Printers and Imaging Products

Terms of Use. Changes. General Use.

Service Specific Terms & Conditions

International Client Centre Terms and Conditions V.1.0 Page 1

Network-MIDI Driver Installation Guide

10 We prohibit crawling, scraping, caching or otherwise accessing any content on the Service via automated means, including but not limited to, user

Windows 2000 and Windows XP Installation

HP Worldwide Limited Warranty and Technical Support

YOUR USE OF THE SITE OUR INTELLECTUAL PROPERTY RIGHTS

RE866 Interface User Guide

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

DME-N Network Driver Installation Guide for M7CL

DATASHEET. 4D 4.3 LCD CAPE Beagle Bone Black 4.3 LCD CAPE. Document Date: 3 rd February 2014 Document Revision: 1.9

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION

SIMS TERMS AND CONDITIONS OF USE AGREEMENT

Online Localization Service

GOCO.IO, INC TERMS OF SERVICE

Mobile Banking and Mobile Deposit Terms & Conditions

4D SYSTEMS TURNING TECHNOLOGY INTO ART. Application Note: 4D-AN-G5002

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )

4. Save as expressly set out herein no license is granted in respect of any intellectual property rights vested in F1000 or other third parties.

Stellar Phoenix Password Recovery For Windows Server. Version 2.0. User Guide

Snapture for Pocket PC For Windows 95/98/ME/2000/XP/2003 and PocketPC

The BlackBerry Enterprise Solution Sure Service Specific Terms and Conditions

Winnebago Industries, Inc. Privacy Policy

Enable Computer Module

OCR Interchange Service Agreement

Terms and Conditions for MPF e-statement/e-advice Service ( Terms and Conditions )

FONT SOFTWARE END USER LICENSE AGREEMENT. We recommend that you print this Font Software End User License Agreement for further reference.

QUARTZ LEGAL TERMS AND CONDITIONS

Terms of Use for companies accessing MyStay Product Database via MyStay API

4D SYSTEMS APPLICATION NOTE. Application Note: 4D-AN-P3001 TURNING TECHNOLOGY INTO ART. ViSi - Displaying Third-Party Fonts

Stellar Phoenix Messenger Password Recovery

TOOLBOX SUBSCRIPTION AGREEMENT FOR OPEN SOURCE PROJECTS

Copyrights and Privacy Statement

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY

Terminal I/O Profile Client Implementation Guide

Pi Gateway Windows 7 Operator Manual

4D Systems. Application Note: 4D-AN-P2002. Playing Video on PICASO based modules using RAW option. Document Date: 15 th December 2012

R227. Terms Code Discount per Sales Code Qty Ordered AR-1227

Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications

TOOLS for n Version2 Update Guide

AN S1401 Using BlueMod+S as Beacon

PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS OF USE BEFORE USING THIS SITE.

User Terms of Service

Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX

DATASHEET 4D SYSTEMS TURNING TECHNOLOGY INTO ART. USB to Serial UART Bridge Converter. Document Date: 5 th September 2012 Document Revision: 1.

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics

TERMS OF SERVICE. Maui Lash Extensions All Rights Reserved.

QPP Proprietary Profile Guide

Terms and Conditions For Online-Payments

Westhold Sign Master User Manual. Version

Healthfirst Website Privacy Policy

PRODUCT GUIDE. N u c l e u s D a t a R e c o v e r y. C o m P r i v a t e L i m i t e d

Transcription:

Installing Your Microsoft Access Database (Manual Installation Instructions) Installation and Setup Instructions... 1 Single User Setup... 1 Multiple User Setup... 2 Adjusting Microsoft Access 2003 Macro Security... 3 Access 2007, 2010 & 2013 - Trusted Folder Locations:... 4 Creating an Access Database shortcut when using Access Runtime... 4 Warranty & Limited Liability Information... 5 Installation and Setup Instructions Read our Warranty, Limited Liability & End User Agreement before installing this database. Before installing your new Access database, you should consider whether you want to install the access database for use by a single user on a single computer, or setup the database for use by multiple users, or multiple computers, on a network. If the database is going to be used by a single user see the Single User Setup instructions below. If the database is going to be used by multiple users and/or accessed from multiple computers on your network, then see the section titled Multiple User Setup. IMPORTANT: For the security of your data you should ensure that you install the database tables (the backend database which contains your data tables) in a local or network folder that is included in your regular data back-up regime. Single User Setup Follow this process to set the database up for a single user: 1. Create a new folder in the location where you want to store the database. This may be a folder under your Documents folder or another folder located on your computer or network. The folder should be in your regularly backup. It is important that the location where the folder is created is NOT within a replicated folder structure. You must also ensure that you have full red, write, delete and execute permissions within the folder where you intend storing the Access database. Page 1

2. Extract all the files, from the WinZip file provided, to the folder that you created for the database. 3. If you have a full version of Microsoft Access Database installed on your computer, simply create a shortcut from the main database file and place the shortcut on your desktop or other convenient location. The main database file is usually named the same or similar to the actual database. For instance if have downloaded the Assets Management database the main database file will be called Assets or Assets.mde. (You may or may not see the.mde extension depending on your computer settings). 4. If you DO NOT have a full version of Microsoft Access Database installed on your computer and intend to operate the database in the Microsoft Access Runtime environment then see the section Creating a shortcut when using Access Runtime below. 5. Before first starting the database: If you are using Microsoft Access version 2003 read the section on Adjusting Microsoft Access 2003 Macro Security. If you are using Microsoft Access version 2007, 2010 or 2013 please read the section Access 2007, 2010 & 2013 - Trusted Folder Locations. 6. Once you have completed the installation process you can run the database at any time by double clicking the shortcut you created at either step 3 or step 4. Multiple User Setup If you have chosen to setup the database for access by multiple users, or for access from multiple computers in your home or office, you will need to install the database into a shared folder or network location which has been similarly mapped on all computers. If you need to setup the database in a folder which is not similarly mapped on all user s computers then you can still share the database, however each user will need to create their own shortcut to the database (see sub-item 4 below) to ensure that the shortcuts points to the correct location, appropriate for their drive mappings. You MUST also ensure that all other users of the database have full permissions (read, write, modify and delete) in the folder where the database is stored. If all users do not have full permissions to the database folder, some users may be prevented from accessing the database whilst a user with limited permissions has the database open on their computer. (If necessary speak to your network administrator for information on folder permissions or visit the Microsoft website for further information. You will also find further information in the FAQ section of the GI Business Database website) Follow this process to setup the database for multiple users: 1. Create a new folder in a shared location on your network (or computer) in which to install the database. The database folder MUST NOT be in a replicated location or set of folders. 2. Ensure that all database users have full read, write, delete and execute permissions in this folder, and that the folder is NOT Read Only Page 2

3. Extract all the files, from the WinZip file provided into the folder you created for the database. 4. If you have a full version Microsoft Access Database installed on your computer then simply create a shortcut from the main database file, in the database folder. The main database file is usually named similar to the actual database. For instance if have downloaded the Assets Management database the main database file will be similar to Assets.mde (You may or may not see the.mde extension depending on your computer settings) 5. Copy the shortcut that you created in the database folder to your desktop or other convenient location. (If the shared folder location is similarly mapped on other user s computers then they need only copy this same shortcut to their own computer. If the other user has a different drive mappings to the shared folder location then they should create their own desktop shortcut to the main database file.) 7. If any user will be Accessing the database using Microsoft Access Runtime, then refer to the section Creating a shortcut when using Access Runtime below. 6. Before starting the database for the first time, each user should read and if applicable follow the steps outlined in Adjusting Microsoft Access 2003 Macro Security or Access 2007 & 2010 - Trusted Folder Locations depending on the version of Microsoft Access that they have installed on their computer. 7. Once a user has completed the installation process they can run the database at any time by double clicking the shortcut created at step 4. Adjusting Microsoft Access 2003 Macro Security By default, Macro protection in Microsoft Access 2003 is set to medium security level. As a result of this you may experience a Warning Page each time you open a Microsoft Access database which was not created on your own computer. To use the database, each time that you start the database you will need to select the option which will allow the macros and code to run before the database will function properly. This will occur whenever the macro security level is set to medium or high. The reason this occurs is because a Microsoft Access database usually contain Visual Basic code and/or Macros which could be programmed with malicious code. This is also the reason why you should not run any Access database unless you have obtained the database from a trusted source. As with most Microsoft Access databases, all of our databases contain visual basic coding and/or macros and therefore unless you have adjusted the Macro Security level in MS Access 2003 the warning dialog box will be displayed. If you want to run the sample database you must select the appropriate option when prompted. If you do not select the 'OPEN' option when prompted the database will not function correctly. Page 3

If you only ever run Microsoft Access databases that you have obtained from trusted sources, such as G.I. Business Database Solutions, you can elect to lower the Macro Security settings to prevent this warning being displayed. This is a simple process which takes only a minute or so to setup. For instructions on how to adjust your Microsoft Access 2003 macro security setting, click the following link to view or download the step by step guide for Microsoft Access 2003 from our website. Access 2007, 2010 & 2013 - Trusted Folder Locations: If you are using Microsoft Access 2007, Microsoft Access 2010 or Microsoft Access 2013 each time that you open a database an Access database created on another computer it will be necessary to let your installation of Access know that you trust the database. This is because Access databases usually contain Visual Basic code and/or Macros, which could be programmed with malicious code. For this reason Microsoft Access 2007, 2010 and 2013 will by default prevent any visual basic code or macros from running in any database until authorised by the user. In fact, you should only ever run an Access database that you obtained from a trusted source. As with most Microsoft Access databases, all of our databases contain visual basic coding and/or macros to provide advanced functionality. Therefore to properly run any of the Access databases that we provide it is necessary for you let Access know that the database is trusted. You can do this each time that you open the database by clicking the ENABLE button located near the top of the screen, or you can add the folder where you have installed the database to the Trusted Locations in your Microsoft Access program. Please be aware that as many of our database do need to run code to test and/or attach data tables upon staring, it may be necessary to add the database folder to the Trusted Locations list before first running the database in order for it to perform this function. The process for setting up Trusted Locations is similar in Access 2007, 2010 and 2013. To assist you we have created step by step guides which are available in the FAQ section of our website. To view or download the guides on our website click the appropriate link below. Step by step guide Setting up Trusted Locations in Microsoft Access 2007 or 2010 Step by step guide Setting up Trusted Locations in Microsoft Access 2013 Creating an Access Database shortcut when using Access Runtime Creating a shortcut to run your Microsoft Access Database in a Runtime environment can sometimes be a hit and miss affair, depending on the version of Windows and version of Microsoft Access Database Runtime that you have installed. Page 4

If you have followed the instruction outlined in the above sections and your shortcut does not operate the database, then it is likely that you will have to do a little manual adjustment to correct the shortcut target fie. Click he following link for instructions on setting up an Access Database shortcut in a Runtime environment Link this to the relevant website faq. Warranty & Limited Liability Information END USERS LICENSE AGREEMENT **YOU MUST BE READ BEFORE INSTALLING OR USING THIS SOFTWARE** BY USING THE SOFTWARE YOU ACKNOWLEDGE THAT YOU HAVE READ THIS END USER LICENCE AGREEMENT, UNDERSTAND IT AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS. YOU ALSO AGREE THAT THE LIMITED WARRANTY IS THE COMPLETE AND EXCLUSIVE STATEMENT OF AGREEMENT BETWEEN THE PARTIES AND SUPERSEDE ALL PROPOSALS OR PRIOR AGREEMENTS, ORAL OR WRITTEN, AND ANY OTHER COMMUNICATIONS BETWEEN THE PARTIES RELATING TO THE SUBJECT MATTER OF THE LIMITED WARRANTY. IF YOU DO NOT ACCEPT THE LICENSE TERMS AND CONDITIONS SET OUT IN THIS END USERS LICENCE AGREEMENT, DO NOT INSTALL, OPERATE OR OTHERWISE USE THE SOFTWARE. This software and accompanying written materials (if any) including instructions for use are provided "as is" without warranty of any kind. GI Business Database Solutions does not warrant, guarantee, or make any representations regarding the use, or the results of use, of the software or written materials (if any) in terms of correctness, accuracy, reliability or otherwise. The entire risk as to the performance of the software and the accuracy of results, reports or other information provided by the software is assumed by you. If the software or written materials are defective, you, and not GI Business Database Solutions or its owners, distributors, agents, or employees, assume the entire cost of all necessary servicing, repair or correction. Under no circumstances and under no legal theory, tort, contract or otherwise shall GI Business Database Solutions nor anyone else who has been involved in the creation, production or delivery of this software be liable to you or any other person for any direct, indirect, consequential or incidental damages of any character including without limitation damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses arising from the use of this software. In no event will GI Business Database Solutions be liable for any damages in excess of the amount GI Business Database Solutions received from you (if any) for the software even if GI Business Database Solutions shall have been informed of the possibility of such damages or for any claim by any third party. This limitation of liability shall not apply to liability for death or personal injury resulting from GI Business Database Solutions negligence only to the extent applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages so this exclusion and limitation may not apply to you. The above is the only warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose, that is made by GI Business Database Solutions on this software. No oral or written information or advice given by GI Business Database Solutions, its owners, Page 5

distributors, agents or employees shall create any further warranty or in any way increase the scope of this warranty and you may not rely on any such information or advice. You the end user is responsible for the maintenance and the security of your computer systems and in particular the confidentiality and privacy law requirements of any information entered into the software. You, the end user is responsible to ensure regular backups of the software and any data entered in or relating to the software. You acknowledge that you are not entitled to any support for the software except for reasonable installation support the first time you install the software. Such support will be provided to you in a manner determined and at the absolute discretion of GI Business Database Solutions. You acknowledge and warrant that prior to purchasing the open source version of the software that you satisfied yourself as to the fitness of the software for the purpose to which you intend to put it and that you did not rely upon any representation made by GI Business Database Solutions which is not expressly stated in this agreement or upon any description, illustration or specification contained in any document including catalogues, web pages, advertising or other publicity material produced by GI Business Database Solutions. Title ownership rights and intellectual property rights in the Software shall remain with GI Business Database Solutions unless otherwise agreed in writing in which event no ownership rights or rights to intellectual property shall be relinquished until such time as the sum agreed to in writing has been received by GI Business Database Solutions. You acknowledge that you must not sell, transfer or otherwise distribute the software to another person and further that you shall fully indemnify GI Business Database Solutions against all liabilities, costs and expenses which GI Business Database Solutions or its distributors, agents, or employees may incur as a result of a breach of the provisions of the agreement by you, or permitted by you. Further, to the extent permitted by law, you fully indemnify GI Business Database Solutions against all liabilities, costs and expenses resulting from any legal action taken by a third party against GI Business Database Solutions arising from your use of this software or any use of the software by a third party permitted by you. The Software is not fault-tolerant and is not designed manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic, control, direct life support machines or weapons systems, in which the failure of the software could lead directly to death personal injury or severe physical or environmental damage. Accordingly, GI Business Database Solutions and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities This agreement represents the complete agreement concerning the use of this software. If any provision of this agreement is held to be unenforceable such provision shall be reformed only to the extent necessary to make it enforceable. This agreement shall be governed by the laws of Victoria Australia excluding conflict of law provisions (except to the extent applicable law if any provides otherwise). The application of the United Nations convention of contracts for the international sale of goods is expressly excluded. Page 6