IT Questions and Answers :)

Thursday, November 23, 2017

For a 64Bit installation of Windows using a 32-Bit installation of Microsoft Office, which ODBC setup would you use to connect to data sources

For a 64Bit installation of Windows using a 32-Bit installation of Microsoft Office, which ODBC setup would you use to connect to data sources?

  • C:\\Windows\Sys\odbcad32.exe
  • C:\Windows\System32\odbcad32.exe
  • Data source (ODBC)
  • C:\Windows\SysWOW64\odbcad32.exe 
 
For a 64Bit installation of Windows using a 32-Bit installation of Microsoft Office, which ODBC setup would you use to connect to data sources

EXPLANATION

The default data source (ODBC) uses the 64Bit instance of Microsoft's 32Bit ODBC connector running in the 64Bit memory space.  Microsoft's default Office installation includes the 32Bit version by default for the highest compatibility with other applications.  So, to use ODBC connections with a default installation of Microsoft's Office products, you must use the instance of the ODBCAD32 application that runs in the 32Bit address space that resides in the C:\Windows\SysWOW64 directory.
This is counter intuitive when you look at the directory, one would logically assume that the SysWOW64 directory would be for 64Bit applications but, this is not the case:  "In computing on Microsoft platforms, WoW64 (Windows 32-bit on Windows 64-bit) is a subsystem of the Windows operating system capable of running 32-bit applications that is included on all 64-bit versions of Windows—including Windows XP Professional x64 Edition, IA-64 and x64 versions of Windows Server 2003, as well as 64-bit versions of Windows Vista, Windows Server 2008, Windows 7, Windows 8, Windows Server 2012, Windows 8.1 and Windows 10. In Windows Server 2008 R2 Server Core, it is an optional component. WoW64 aims to take care of many of the differences between 32-bit Windows and 64-bit Windows, particularly involving structural changes to Windows itself." -- https://en.wikipedia.org/wiki/WoW64
https://support.microsoft.com/en-us/help/2721825/unable-to-create-dsn-for-microsoft-office-system-dr...
Share:

An initialization vector should be which of the following?

An initialization vector should be which of the following?

  • Unique and predictable
  • Repeatable and random
  • Unique and unpredicatable
  • Repeatable and unique 

 

 EXPLANATION

An initialization vector (IV) should be unique and unpredictable. To prevent an attack, an IV must not be repeated with a given key and should appear random.

SOURCE

https://en.wikipedia.org/wiki/Initialization_vector
Share:

Which of the following is considered the first object-oriented programming language?

Which of the following is considered the first object-oriented programming language?

  • Java
  • Simula 67
  • C++
  • Smalltalk 

 
Which of the following is considered the first object-oriented programming language?

EXPLANATION




The formal programming concept of objects was introduced in the 1960's in Simula. The Simula 1 and later Simula 67 were programming languages designed for discrete event simulation/ jSijmula was created by Ole-Johan Dahl and Kristen Nygaard of the Norwegian Computing Center in Oslo/
https://en.wikipedia.org/wiki/Object-oriented_programming#History
https://en.wikipedia.org/wiki/Simula

SOURCE

https://en.wikipedia.org/wiki/Simula
Share:

In Linux systems with iproute2, which command will list all routes?

In Linux systems with iproute2, which command will list all routes?

  • ip route show
  • route print
  • show ip route
  • route 

 
In Linux systems with iproute2, which command will list all routes?

EXPLANATION

In Linux systems equipped with iproute2, the command "ip route show" will display the current routing table.
In older Linux systems, the shorter command "route" was available through the net-tools package; this package is now deprecated in favor of iproute2.
"show ip route" is the command to show the routing table in Cisco's IOS.
"route print" will show the routing table in Windows.

Share:

Which of these is NOT a type of intrusion detection system (IDS)?

Which of these is NOT a type of intrusion detection system (IDS)?

  • Host-based
  • Tunnel-based
  • Network-based
  • Behavior-based 

 
Which of these is NOT a type of intrusion detection system (IDS)?

EXPLANATION

Behavior-based IDS looks for variations in behavior, like unusually high traffic, policy violations, things like that. Deviations in behavior help it recognize potential threats. A network-based IDS examines all network traffic going to and from network systems. A host-based IDS refers to applications like spyware or virus applications that are installed on individual network systems and monitor for things like system file modifications or registry changes.

Share:

Popular Posts