There are several different objects in the access database.
The access database has 7 different objects: "table", "query", "form", "report", "page", "macro" and "module"; among them, the table is the core object , mainly used to store data. These objects are each responsible for certain functions in the database and cooperate with each other to build a database.
The operating environment of this article: windows10 system, Dell G3 computer, Microsoft Office Access2019.
Related recommendations: "Access Tutorial"
In Access, the so-called building materials are the main objects in the database, which include "table" and "query" , "Form", "Report", "Page", "Macro" and "Module". These objects are each responsible for certain functions in the database and cooperate with each other to build a database.
1. Table - Table is the basic object of the database and the basis for creating the other five objects. Tables are composed of records, and records are composed of fields. Tables are used to store database data, so they are also called data tables.
Table is the core object of Access database, mainly used to store data. It is the basis for creating several other objects.
2. Query - Query can quickly find the required records according to the index, filter the records according to the requirements, and can connect the fields of several tables to form a new table.
3. Form (Form) - Form provides a convenient window for browsing, inputting and changing data. You can also create subforms to display the contents of associated tables. A form is also called a form.
4. Report - The function of the report is to classify and summarize the data in the database and then print it out for analysis.
5. Macro - Macro is equivalent to batch processing in DOS, used to automatically perform a series of operations. Access lists some commonly used operations for users to choose from, which is very convenient to use.
6. Page - is a special kind of WEB page that is directly connected to the data in the database. The data is published to the Internet or Intranet through the data access page, and the browser can be used to maintain and operate the data.
7. Module - The function of a module is similar to that of a macro, but the operations it defines are more detailed and complex than macros. Users can write programs according to their own needs. The module is programmed using Visual Basic.
In the database, "table" is used to store data; "query" is used to find data; people obtain data through "form", "report" and "page"; and "macro" and "module" ” is used to realize automatic operation of data. In fact, for a database, the most important function is to obtain data in the database, so the flow of data between various objects in the database has become what we are most concerned about. In order to be able to clearly arrange various structures when building a database in the future, you should first understand the functions and connections between objects in the Access database.
As a database, the most basic thing is to have a table and data stored in the table. For example, in the "address book" database, you must first create a table, and then enter someone's contact address, phone number and other information into the data table, so that there is a data source in the database.
After having these data, they can be displayed on the form. This process is to establish a connection between the data in the table and the controls on the form. This process is called "binding" in Access.
In this way, the data actually stored in the table can be obtained through various form interfaces on the screen. Moreover, reasonably placing controls and patterns on the form can make it easier for us to operate and understand the meaning of the data in the database.
In this way, the flow of data from the table to the form is completed, and the data in the database is communicated between the computer and the human. For example, in the "Address Book" database, use an automatic form to display a record in the database on the form, and control the record operation button on the form to move back and forth in the table, and you can see information corresponding to other records.
For more programming-related knowledge, please visit: Introduction to Programming! !
The above is the detailed content of There are several different objects in the access database.. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



DeepSeek cannot convert files directly to PDF. Depending on the file type, you can use different methods: Common documents (Word, Excel, PowerPoint): Use Microsoft Office, LibreOffice and other software to export as PDF. Image: Save as PDF using image viewer or image processing software. Web pages: Use the browser's "Print into PDF" function or the dedicated web page to PDF tool. Uncommon formats: Find the right converter and convert it to PDF. It is crucial to choose the right tools and develop a plan based on the actual situation.

Apple's latest releases of iOS18, iPadOS18 and macOS Sequoia systems have added an important feature to the Photos application, designed to help users easily recover photos and videos lost or damaged due to various reasons. The new feature introduces an album called "Recovered" in the Tools section of the Photos app that will automatically appear when a user has pictures or videos on their device that are not part of their photo library. The emergence of the "Recovered" album provides a solution for photos and videos lost due to database corruption, the camera application not saving to the photo library correctly, or a third-party application managing the photo library. Users only need a few simple steps

Solve the problem of third-party interface returning 403 in Node.js environment. When we use Node.js to call third-party interfaces, we sometimes encounter an error of 403 from the interface returning 403...

The impact of sharing of Redis connections in Laravel framework and select methods When using Laravel framework and Redis, developers may encounter a problem: through configuration...

MySQL is an open source relational database management system. 1) Create database and tables: Use the CREATEDATABASE and CREATETABLE commands. 2) Basic operations: INSERT, UPDATE, DELETE and SELECT. 3) Advanced operations: JOIN, subquery and transaction processing. 4) Debugging skills: Check syntax, data type and permissions. 5) Optimization suggestions: Use indexes, avoid SELECT* and use transactions.

How to avoid the third-party interface returning 403 error in the Node environment. When calling the third-party website interface using Node.js, you sometimes encounter the problem of returning 403 error. �...

The advantage of multithreading is that it can improve performance and resource utilization, especially for processing large amounts of data or performing time-consuming operations. It allows multiple tasks to be performed simultaneously, improving efficiency. However, too many threads can lead to performance degradation, so you need to carefully select the number of threads based on the number of CPU cores and task characteristics. In addition, multi-threaded programming involves challenges such as deadlock and race conditions, which need to be solved using synchronization mechanisms, and requires solid knowledge of concurrent programming, weighing the pros and cons and using them with caution.

The main reasons why you cannot log in to MySQL as root are permission problems, configuration file errors, password inconsistent, socket file problems, or firewall interception. The solution includes: check whether the bind-address parameter in the configuration file is configured correctly. Check whether the root user permissions have been modified or deleted and reset. Verify that the password is accurate, including case and special characters. Check socket file permission settings and paths. Check that the firewall blocks connections to the MySQL server.
