Microsoft Access database can get corrupt for several reasons, including concurrent updating of data, unexpected power outage, virus attack, JET errors, and the like. In most of these situations, the data stored in database tables can no longer be accessed. Such circumstances can further turn out be more disastrous if user falls short of restoring from previous backup. To deal with these problems and to repair the corrupted database, an Access Database Repair utility can help.
For more clarification on this topic, let's consider the case of an accounting database that has been created using Microsoft Access. The database contains hundreds of entries and is very important from business perspectives. But suddenly, when you try to access this accounting database, it won't open, giving corruption symptoms. Further, trying to import or compact the database doesn't help, instead, you get the below mentioned error message:
"Error 3112 : Record(s) can't be read; no read permission on databasename.mdb."
Where, databasename refers to the name of accounting database.
Explanation and User Action
Below are some possible reasons and the corresponding actions required to be taken against this problem:
- In Microsoft Access 97 and earlier versions, this type of data corruption is known to occur when user appends data to the end of memo field from different instances of Access. This issue has been fixed in Microsoft Jet 3.5 Service Pack 3.
- The similar problem can also occur when you use OpenRecordset method to access a secure database table. Using the correct coding usually solves this problem.
- Sometimes, the corruption can be severe enough for Access 'Compact and Repair' utility to resolve it. In such cases, if you can open the database, try to copy or import the database content into a new database. However, if this is not possible, you should either use your previous backup or apply a third-party utility to Repair Access Database. The commercial Access Database Repair software can scan corrupted Access database using effective scanning algorithms and restore its content at a safe location.