Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Software

Looking back at Microsoft Access Easter Eggs

By greg shultz August 15, 2007, 3:41 PM PDT

Image
1
of 15

Title_Page1.png
Title_Page1.png
Looking back at Microsoft Access Easter Eggs

By Greg Shultz

By Greg Shultz

If you’ve been using computers for a while, you know that an Easter Egg is a small program that is hidden deep inside of an application and is designed by the application’s developers as a way of displaying their names — very similar to the credits that you see at the end of a movie. However, uncovering the Easter Egg is tricky as it almost always involves performing a series of very intricate and non-intuitive steps.

Microsoft now officially bans Eater Eggs as part of their Trustworthy Computing initiative. But before that mandate, Microsoft’s developers used to go to great lengths to secretly embed Easter Eggs into their products.

While the developers for other Microsoft Office products created some really elaborate Easter Eggs, the developers for Access didn’t really push the envelope. I suppose that could indicate that the Access developers were a more serious bunch. Anyway, in this gallery I’ll show you the Easter Eggs that they embedded into Access 95, 97, and 2000.

Looking back at Microsoft Access Easter Eggs

Access 95 - Easter Egg 1

Access 95 - Easter Egg 1

When you see the Macro window, type anything you want in the Action box and then click the Close button in the upper right corner.

Looking back at Microsoft Access Easter Eggs

Access 95 - Easter Egg 1

Access 95 - Easter Egg 1

You’ll then see a dialog box displaying an answer from the Magic Eight Ball.

Looking back at Microsoft Access Easter Eggs

Access 95 - Easter Egg 2

Access 95 - Easter Egg 2

In the User and Group Accounts dialog box, click the New button.

Looking back at Microsoft Access Easter Eggs

Access 95 - Easter Egg 2

Access 95 - Easter Egg 2

When you see the New User /Group dialog box, you type Pioneer in the Name text box and 092595 in the Personal ID text box.

Looking back at Microsoft Access Easter Eggs

Access 95 - Easter Egg 2

Access 95 - Easter Egg 2

At the very bottom of the Special Thanks To section, you’ll find your name. Here you can see that my name appears in the credits list.

Looking back at Microsoft Access Easter Eggs

Access 95 - Easter Egg 2

Access 95 - Easter Egg 2

At the tail end of the credits sequence, you’ll find some humorous phrases.

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 1

Access 97 - Easter Egg 1

When you see the Magic Eight Ball macro in the database, pull down the View menu and select Toolbars | Customize. When you see the Customize dialog box, select the Commands tab, scroll down the Categories list and select All Macros.

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 1

Access 97 - Easter Egg 1

Close the Customize dialog box, but leave the database window open. Then, think of a yes/no question and click the Magic Eight Ball button.

You’ll then see a dialog box displaying an answer.

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 2

Access 97 - Easter Egg 2

The second Easter Egg in Access 97 reveals the developer credits screen. To access it, you begin by creating a new database in Microsoft Access. You then click the New button to create a new Table.

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 2

Access 97 - Easter Egg 2

You then save the new table as Go Speed Racer Go

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 2

Access 97 - Easter Egg 2

Next, you pull down the Help menu and select the About Microsoft Access command. When you see the About Microsoft Access dialog box, you double click the Access icon with the right mouse button.

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 2

Access 97 - Easter Egg 2

As soon as you do, your screen will turn black and the credits will begin scrolling up from the bottom.

Looking back at Microsoft Access Easter Eggs

Access 97 - Easter Egg 2

Access 97 - Easter Egg 2

At the tail end of the credits sequence, you’ll find your name along with some humorous phrases.

Looking back at Microsoft Access Easter Eggs

Access 2000

Access 2000

When you see the Magic Eight Ball macro in the Database window, you pull down the View menu and select Toolbars | Customize.

  • Software
  • Account Information

    Share with Your Friends

    Looking back at Microsoft Access Easter Eggs

    Your email has been sent

Share: Looking back at Microsoft Access Easter Eggs
Image of greg shultz
By greg shultz
My first computer was a Kaypro 16 \"luggable\" running MS-DOS 2.11 which I obtained while studying computer science in 1986. After two years, I discovered that I had a knack for writing documentation and shifted my focus over to technical writing.
  • Account Information

    Contact greg shultz

    Your message has been sent

  • |
  • See all of greg's content

TechRepublic Premium

  • TechRepublic Premium

    Shadow IT policy

    Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Auditing and logging policy

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...

    Published:  February 2, 2023, 11:00 AM EST Modified:  February 3, 2023, 3:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Vendor contract renewal planner

    Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...

    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 12:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Access management policy

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...

    Downloads
    Published:  February 1, 2023, 11:00 AM EST Modified:  February 2, 2023, 4:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice