In this brief chapter, we looked at some simple programmatic techniques to change the Access environment. You saw how to change the startup properties, as well as some optional properties. The chapter also provides some handy tables for reference.
We will now turn our attention to one of the most important topics you will need to deal with: security.