Which plan includes procedures and processes that ensure the smooth functioning of the business even after a disaster?

A(n)

plan includes procedures and processes that ensure the smooth functioning of the business even after a

disaster

Answers

Answer 1

Answer:

The plan that includes procedures and processes that ensure the smooth functioning of the business even after a disaster is the:

business continuity and disaster recovery plan.

Explanation:

An entity that has good business continuity and disaster recovery plan maintains its full operational activities and processes after a business disaster.   After the business disaster, the entity may even grow bigger, because it has identified critical functions and their dependencies for continued growth.  While the period is a time of recovery, for business entities that are well-prepared, the recovery period offers a unique opportunity for innovation and rapid recovery and development on all fours: organization, processes, people, and performance.

Answer 2

Answer:

Business Continuity Plan

Explanation:

                                     Sincerely : Baby weeb


Related Questions

What is PCM system? essay

Answers

A PCM system consists of a PCM encoder (transmitter) and a PCM decoder (receiver). The essential operations in the PCM transmitter are sampling, quantizing and encoding. All the operations are usually performed in the same circuit called as analog-to digital convert Early electrical communications started to sample signals in order to multiplex samples from multiple telegraphy sources and to convey them over a single telegraph cable. The American inventor Moses G. Farmer conveyed telegraph time-division multiplexing (TDM) as early as 1853. Electrical engineer W. M. Miner, in 1903, used an electro-mechanical commutator for time-division multiplexing multiple telegraph signals; he also applied this technology to telephony.

Time-division multiplexing (TDM) for telegraphs was first introduced in 1853 by an American inventor named Moses G. Farmer. W. M. Miner, an electrical engineer, developed an electro-mechanical commutator in 1903 to time-division multiplex many telegraph signals. He later used similar technology for telephone.

What best define about PCM system?

An encoder (transmitter) for PCM and a decoder for PCM make up a PCM system (receiver). Sampling, quantization, and encoding are the three key processes in the PCM transmitter.

Typically, a circuit known as an analog-to-digital converter is used to carry out all the processes. To multiplex samples from many telegraphy sources and transmit them over a single telegraph line, early electrical communications first started to sample signals.

Therefore, a digital approach where the measured amplitude of an analogue signal is coded into a string of binary values after periodically sampling the signal.

Learn more about PCM system here:

https://brainly.com/question/28599250

#SPJ2

In python:

Assign sum_extra with the total extra credit received given list test_grades. Full credit is 100, so anything over 100 is extra credit. For the given program, sum_extra is 8 because 1 + 0 + 7 + 0 is 8.

Sample output for the given program with input: '101 83 107 90'

Sum extra: 8

Answers

Answer:

test_grades = []

tryagain = 'y'

while tryagain.lower() == 'y':

   grade = int(input("Grade: "))

   test_grades.append(grade)

   tryagain = input("Another Input: ")

sum_extra = 0

for i in test_grades:

   if i > 100:

       sum_extra = sum_extra + (i - 100)

print(sum_extra)

Explanation:

This line initializes an empty list test_grade

test_grades = []

This line prepares the user for input

tryagain = 'y'

The following iteration is repeated until the user stops input

while tryagain.lower() == 'y':

This prompts the user for grade

   grade = int(input("Grade: "))

This appends the grade to the list

   test_grades.append(grade)

This asks if there is another grade to be input

   tryagain = input("Another Input: ")

This initializes sum_extra to 0

sum_extra = 0

This iterates through test_grade

for i in test_grades:

The following if condition gets the grades greater than 100 and sums the extra credit

   if i > 100:

       sum_extra = sum_extra + (i - 100)

This prints the extra credit

print(sum_extra)

Which group scope can be used to assign permissions to resources only in the domain in which the group is created

Answers

Answer: Domain local group

Explanation:

Domain Local Group is a form of group in a Windows Server network in Microsoft which is used by an administrator to assign permissions to the resources that are in same domain.

Their scope is strictly restricted to their particular domain. It should also be noted that they've open membership which simply implies that members form other domain can be added to them. One has to first know the users that have identical job responsibilities in order to use the domain local group, then identify the network resources that are similar which users want to access.

With which feature or menu option of a word processing program can you make an image like this?
You can get this image using the
option of a word processing program.
Reset
Next

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is Chart.

You can insert an image like as given in the question using the Chart feature in the word processing document. This image called the bar graph chart.

You can insert a chart in your word processing document going through the Insert tab, then find the chart option under the Illustrations group of the command.

As you click on the chart, different types of charts will be shown to you. You can click on the required chart and insert it into the document. The inserted chart can be customized while double-clicking on the inserted chart.

What is a primary difference between the header section of a document and the body
The body is displayed on the web page and the header is not.
The header is displayed on the web page and the body is not
The tag for the body is self-closing, but the tag for the header must be closed.
The tag for the header is self-closing, but the tag for the body must be closed.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The header and body are parts of the web page. As, you know that in the header section, we define mostly script and title information for the page. While the body section contains the page content.

In this question, the given options are:

The body is displayed on the web page and the header is not. The header is displayed on the web page and the body is not The tag for the body is self-closing, but the tag for the header must be closed. The tag for the header is self-closing, but the tag for the body must be closed.

The correct answer to this question is 1:

The body is displayed on the web page and the header is not.

While the other options are not correct because:

The body always displays the content of the page while the header does not display on the web page. And, also all body and header tags must be closed.

i lost my account!-_-​

Answers

Answer:

and?

Explanation:

thx for the points btw

write declarations for variables p1 and p2 whose values will be addresses of memory locations in which a double can be stored

Answers

Answer:

double * p1;

double * p2;

Explanation:

A pointer is a variable that holds the address location of other variables. It is defined with the asterisk character in the middle of the variable type and name.

The p1 and p2 pointers above are pointers that hold the memory addresses of two different double or float point numbers.

give me a code that draws a house with a roof in python. Please Answer!!!

Answers

import turtle

window = turtle.Screen()

tr = turtle.Turtle()

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.back(100)

tr.left(120)

tr.forward(75)

tr.right(78)

tr.forward(60)

window.mainloop()

In my code, we use the turtle module for the graphics to draw the house with a roof.

1. Write a SELECT statement that returns these columns: The count of the number of orders in the Orders table The sum of the TaxAmount columns in the Orders table

Answers

Answer:

SELECT

COUNT(SN), SUM(TaxAmount)

FROM ORDERS  

or

SELECT

COUNT(SN) AS NumOrder, SUM(TaxAmount) As TotalTax

FROM ORDERS

Explanation:

Finding it difficult to add my explanation. So, I used an attachment instead

Consider the classes Food, Cheese, and Velveeta where Cheese is a subclass of Food and Velveeta is a subclass of Cheese. State which of the following lines of code are legal.

Cheese c =new Food( );
Velveeta v =new Food( );
Cheese c =new Velveeta( );
Food f =new Velveeta( );
Food f =new Cheese( );

Answers

Answer:

Cheese c =new Velveeta( );

Food f =new Velveeta( );

Food f =new Cheese( );

Explanation:

The super-class is the parent class from which features and attributes are inherited from while the subclass or the child class is the class inheriting from the super or parent class.

In Java, the object instance of a class is created with the syntax;

class_name instance_name = new class_name();

Food is the super or parent class of Cheese (which makes Cheese its subclass) and Cheese is the parent class of Velveeta. The extends keyword is used to denote inheritance.

b) Write Java code for sorting the Actors’ musical skills in ascending order

Answers

Answer:

bxnxjxksoapowowe is a a o v loser player of the year to same time with me in fig

Write code that will copy the contents of the file into an array. You can assume that the file will only have 5 data values

Answers

Answer:

Explanation:

The following code is written in Java. It is a function that reads the file in the URL that is given in the parameter. It then places the file into a String and assumes that each element is separated by a space (" "). It then loops through that string adding each element into the created local ArrayList. Finally, It prints the contents of the ArrayList and returns the ArrayList.

public static ArrayList<String> toArray (String file) throws IOException {

               ArrayList<String> myArr = new ArrayList<>();

               BufferedReader reader = new BufferedReader(new FileReader(file));

               String readFile = reader.readLine();

               reader.close();

               for (int x = 0; x < readFile.length(); x++) {

                       int start = 0;

                       if (readFile.charAt(x) == ' ') {

                               myArr.add(readFile.substring(start,x));

                               start = x + 1;

                       }

               }

               for (String x : myArr) {

                       System.out.println(x);

               }

               

               return myArr;

       }

g Write a program that allows a user to input any text in your program. Using the tools that we have discussed, your program should output how many unique words were in the input and then output how many words were unique.

Answers

Answer:

Explanation:

The following function/program is written in Java. It asks the user for a sentence as an input and then splits that sentence into an array of words. Then it creates an arrayList for all of the unique words, comparing each word in the sentence with all of those in the ArrayList. If a word is found in the ArrayList it cancels the loop and moves on the next word in the sentence. Finally, it counts all of the unique words in the ArrayList and prints that total to the screen.

public static void uniqueWords() {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a sentence:");

       String sentence = in.nextLine();

       String words[] = sentence.split(" ");

       ArrayList<String> uniqueWords = new ArrayList<>();

       for (int x = 0; x < words.length; x++) {

           boolean exists = false;

           for (int i = 0; i < uniqueWords.size(); i++) {

               if (words[x].equals(uniqueWords.get(i))) {

                   exists = true;

                   break;

               }

           }

           if (exists == false) {

               uniqueWords.add(words[x]);

           }

       }

       System.out.println(uniqueWords.size());

   }

Jaina is a big fan of a popular comic book series and is so inspired that she decides to write her own story. She starts her own web comic using the same characters from her favorite comic, but with her original art and story writing. To design the rest of her website, Jaina scans a few pictures from her copies of the popular comic and recolors them slightly. Nowhere on the website does Jaina mention the original comic book authors. Jaina believes that she is not plagiarizing since she has created original work based simply based on pre-existing ideas.

What kind of consequences might result from Jaina's actions?

Answers

Answer:

She probably go to jail for a few

which refers to the sets of rules that outline specification of dimensions design of operation materials and performance or describe quality of materials products or systems?​

Answers

Answer:

Standards

Explanation:

STANDARDS can simply be defined as a set of guideline, rules or laydown rules to follow either during a manufacturing process or production process among others.

For Example A company or an organization that want to produce a quality goods or products has to have a laydown STANDARDS which will serve as a guideline during the production process such as the quality and quantity of materials they are to use , specification of the materials to use, the type and description of materials to use which will inturn enable them to produce quality goods due to the already lay down STANDARDS or rules which the company or organization followed.

A class can inherit behavior from a parent but also define its own and override parent behavior. This is called:

Answers

Answer:

Method overriding.

Explanation:

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

A class can inherit behavior from a parent but also define its own and override parent behavior. This is called method overriding.

Method overriding occurs when there are two (2) methods with the same method parameter and name. The parent class handles one of the methods while the other is in the child class.

Hence, method overriding allows a child class to define its own specific implementation of a method and override parent behavior.

Drag the tiles to the correct boxes to complete the pairs.
Brian, a math Instructor, needed to make a quick announcement to his students. Since he was in a hurry, he asked a student named Rob to jot
down the points and mail it to the student malling list. Later in the day, when the students checked their email, they found Brian's
announcement mail sent to them by Rob. Match the components to their duties as per the communication systems model.
Brian
students
announcement
email
Rob
channel
sender
message

Answers

Answer:

The answer to the question is given in the explanation section.

Explanation:

We have given

Brian, student, announcement, email, rob, channel, sender, message

These are 8 pairs we have to combine the corresponding two.

Brain : sender

Rob: Student

Channel: Announcement

Email: Msg

Answer:

ANSWER: Channel: Email. Sender: Brian. Message: Announcement. Transmitter: Rob. Receiver: Students

Explanation:

Just posting what's in the comments giving full credit to them though

Edmentum/Plato 2021

Which data structure provides support for analytical processing by storing both detailed and summarized data

Answers

Answer:

Data warehouse

Explanation:

DATA WAREHOUSE are often use for analysis of data as well as data reporting reason been that DATA WAREHOUSE help to collect large amount of data and they as well help to manage data from different and various sources which is why most companies, business or organization make use of DATA WAREHOUSE to help store their large amount of information or data.

Write a function shuffle that takes as input parameter arguments two vectors of integer values and returns a vector of integer values that combines the two input vectors by alternating between values from each of the two vectors.

Answers

Answer:

This question is answered using C++

vector<int> shuttle(vector<int> vect1 , vector<int> vect2)  {  

  vector<int> result;

  for(int i=0;i<vect1.size();i++) {

      result.push_back(vect1[i]);

      result.push_back(vect2[i]);

  }

  return result;

}  

Explanation:

This defines the vector function with two vector arguments

vector<int> shuttle(vector<int> vect1 , vector<int> vect2)  {  

This declares result as an integer vector

  vector<int> result;

The following iterates through the vector arguments

  for(int i=0;i<vect1.size();i++) {

The next two lines combine the two input parameters into the result vector declared above

      result.push_back(vect1[i]);

      result.push_back(vect2[i]);

  }

This returns the vector of both input vectors

  return result;

}  

See attachment for complete program that include the main method

The function which combines two different vector variables is written in python using the Numpy module. The program goes thus :

import numpy as np

#import the Numpy module

vec1 = np.arange(3)

#a 1 - d vector array with 0, 1, 2

vec2 = np.arange(4,7)

#a 1 - d array vector array with 4, 5, 6

def shuffle(vector_1 , vector_2):

#initialize a function named shuffle which takes tow parameters

return np.concatenate((vec1, vec2))

#return a combined array of the vectors using the concatenate function

print(shuffle(vec1, vec2))

#A sample run of the program

Learn more : https://brainly.com/question/22288029


8. Input device which allows you to input drawings which input device which allows you to input drawings ​

Answers

Answer:

bro is there any answers that you could provide?

if not, the only thing i can think of is the turtle program.

Explanation:

Claudia is allowed to work from home 3 days per week. She takes home sensitive personnel files on a flash drive for use while at home. The company does not allow remote access to the company servers, but Claudia is free to use either a cloud-based version of the application or have it installed on her home machine. Which type of application category would you recommend Claudia use at home?

Answers

Answer:

Installed software

Explanation:

Since we are told that she is often allowed to work from home 3 days in a week in which She takes home with her sensitive files that is contained in her flash drive for use while at home which means that in a situation where her company does not allow remote access to the company servers in which she is only free to either make use of a cloud-based version of the application or have it installed on her home machine the type of application category i would recommend her to use at home is for her to INSTALLED SOFTWARE on her home machine reason been she mostly work from home and secondly if software is installed on her machine it would make it more easier for her carry out her tasks from home.

Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that apply)

Question 2 options:

a)

balance, contrast, and unity


b)

balance, contrast, and similarity


c)

gestalt, unity, and hierarchy


d)

gestalt, scale, and simplicity


e)

balance, control, and dominance

Answers

Answer:

I believe it's b

Explanation:

I'm straight

You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on. He has asked you to fix it. You suspect that the power supply may be failing. Which of the following is the BEST way to determine whether the power supply is causing the reboots

a. Replace the power supply.
b. Listen for POST code beeps to determine the error's cause
c. Verify that the fan on the power supply is spinning
d. Use a multimeter to the power supply.

Answers

Answer:

D: Use a multimeter to test the power supply

Explanation:

We want to determine whether the power supply is causing the reboots. Now, the most ideal thing to do will be to connect a multimeter to help in testing the source of power supply. This is because a multimeter measures the major factors in power which are voltage, current and resistance and as such it is therefore a standard diagnostic tool used widely by technicians in the electrical & electronic industries.

We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the efficiency of an algorithm. a. time complexity b. one-way function c. OAEP d. timing attack

Answers

Answer:

a. time complexity

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer.

We define the time complexity of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the efficiency of an algorithm.

Hence, the time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

An array is said to be dual if it has an even number of elements and each pair of consecutive elements sum to the same value. Return true if the array is dual, otherwise return false.

Answers

Answer:

def is_dual( array):

   if len(array) % 2 == 0:

       count = 0

       for i in range(0, len(array)//2, 2):

           if array[i] + array[i+1] == array[0] + array[1]:

               count += 1

       if count == len(array)//2:

           return True

       else:

           return False

Explanation:

The python program defines a function called is_dual that accepts an array parameter and check if the array is dual. If it meets the condition, the function returns true but returns false when the array is not dual.

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

a. HIDS
b. NIDS
c. NIPS
d. HIPS

Answers

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

An update anomaly can occur if A. an instance of the same data is stored in two or more places in the database. B. a data element is deleted and causes the loss of information about a different data element. C. a user incorrectly changes a value. D. a data element is left out of an update.

Answers

Answer:

A. an instance of the same data is stored in two or more places in the database.

Explanation:

Giving that Update Anomalies usually occur when the designated user person in keeping records or record master stored a particular data in more than one in a database. This is what is called duplication of data and is termed an irregularity on the part of the record keeper.

Hence, the correct answer to the question is " A. an instance of the same data is stored in two or more places in the database."

what is the effects of computer and internet attacks​

Answers

Answer:

ads, damage, or bugs

Explanation:

(Numerical Data Representation) How many bits per word are required to represent the following positive decimal integers: a.0 through 100b.0 through 255c.0 through 256d.0 through 10,000,000

Answers

Answer:

a. 7 bits

b. 8 bits

c. 9 bits

d. 24 bits

Explanation:

Required

Number of bits per word

The formula to get the number of bits per word is:

[tex]2^n = N[/tex]

Where

n = bits

N = numbers

Solving (a) 0 to 100

There are 101 digits between 0 and 100 (inclusive)

So:

[tex]N = 101[/tex]

Substitute 101 for N in [tex]2^n = N[/tex]

[tex]2^n = 101[/tex]

101 can not be expressed as an exponent of 2.

So, we substitute 101 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 128[/tex]

Express 128 as an exponent of 2

[tex]2^n = 2^7[/tex]

Apply law of indices

[tex]n = 7[/tex]

Hence, 7 bits are required

Solving (b): 0 through 255

There are 256 digits between 0 and 255 (inclusive)

So:

[tex]N = 256[/tex]

Substitute 256 for N in [tex]2^n = N[/tex]

[tex]2^n = 256[/tex]

Express 256 as an exponent of 2

[tex]2^n = 2^8[/tex]

Apply law of indices

[tex]n = 8[/tex]

Hence, 8 bits are required

Solving (c): 0 through 256

There are 257 digits between 0 and 256 (inclusive)

So:

[tex]N = 257[/tex]

Substitute 257 for N in [tex]2^n = N[/tex]

[tex]2^n = 257[/tex]

257 can not be expressed as an exponent of 2.

So, we substitute 257 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 512[/tex]

Express 512 as an exponent of 2

[tex]2^n = 2^9[/tex]

Apply law of indices

[tex]n = 9[/tex]

Hence, 9 bits are required

Solving (d): 0 through 10000000

There are 10000001 digits between 0 and 10000000 (inclusive)

So:

[tex]N = 10000000[/tex]

Substitute 10000000 for N in [tex]2^n = N[/tex]

[tex]2^n = 10000000[/tex]

10000000 can not be expressed as an exponent of 2.

So, we substitute 10000000 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 16777216[/tex]

Express 16777216  as an exponent of 2

[tex]2^n = 2^{24[/tex]

Apply law of indices

[tex]n = 24[/tex]

Hence, 24 bits are required

please tell fast plzzzzzz.​

Answers

Answer:

True

Explanation:

Other Questions
Rob is saving to buy a new MP3 player. For every $12 he earns babysitting, he saves $5. On Saturday, Robearned $72 babysitting. How much money did he save?If he earned $72, he saved $ (I Shelby Cabinets, Inc. produces custom cabinets. The following inventory balances appeared on its balance sheet.12/31/201212/31/2011Raw materials inventory$ 8,000$ 10,000Work-in-process inventory600,000550,000Finished goods inventory350,000410,000Shelby Cabinets had $1,265,000 in sales for the year ended December 31, 2012. The company also had the following costs for the year:Selling$ 90,000General and administrative$240,000Raw materials purchases$100,000Direct labor used in production$125,000Manufacturing overhead$630,000Of the total raw materials placed in production for the year, $12,000 was for indirect materials and must be deducted to find direct materials placed in production.Using the above information, what was Shelbys Cost of Goods Manufactured?(Hint: You must first calculate Direct materials placed in production before calculating the Cost of Goods Manufactured.)Group of answer choices$795,000$845,000$855,000$1,395,000 Mis abuelos ______ viejos y divertidos.essonestaestan 10-11 points on this one, why Did John Lewis go to school and how does that make him an individualst? One wintry week a ski town got 15 1/2 inches of snow on Monday the town got 2 3/4 inches on Tuesday it got 1 1/2 times as much and on Wednesday it got 7/8 inches how much snow did the town get the rest of the week pls help Ill give Brainlyleast (14 points) ____ is a technique for confirming that q received packet or frame is likely to match what was sent a. Redundancy b. Framingc. Error Checking GIVING BRAINLIEST IF SOMEONE GIVES ME THE CORRECT ANSWER AND EXPLAINS IN A SENTENCE OR TWOWhy was the Great Fire of London in 1666 so devastating?London followed the actions of Europe, yet they too refused to set up a fire department.The Kings royal firefighters were not notified at the start of the fire.London was unprepared and so it forced citizens to organize a firefighting system.Londoners had never experienced any fires previous to that time. Which of the following was not a place where people traveled from to trade in the Sahel?A. AsiaB. AfricaC. EuropeD. the Mediterranean Which event established Atlanta as the busiest city in Georgia?A The Federal Highway Act of 1956B Atlanta hosted the Summer Olympics in 1966C Delta Airlines relocated from Louisiana to Atlanta.D The Metropolitan Atlanta Rapid Transit Authority was created in 1971. the foundation of a building is in the shape of a rectangle WITH THE LENGTH OF 20 METERS AND A WIDTH OF 18 METERS. TO THE NEAREST METER, WHAT IS THE DISTANCE FROM THE TOP LEFT CORNER OF THE FOUNDATION TO THE BOTTOM RIGHT CORNER Write a small program that creates a list called dogs and stores the values "Rex", "Spike", and "Spot". At the end of the app, write code that replaces "Rex" with "Fives". What is the quotient of the division below?336 divided by 7 =45464849 CAN YOU PLZ ANSWER THE QUESTION IT IS THE PICTURE!!! plsssss be quick!!!What is the solution to this system of equations?1/4x+1 1/2y= 5/83/4x- 1 1/2y= 3 3/8A) (4,-1/4)B) (4,-9/16)C) no solutionD) infinitely many solutions why do we use newton's help me out plzzzzzzzz how many cities to determine the epicenter of anearthquake True/False. Assembly lines increased production and raised the price of automobiles for consumers. Sam Hustons greatest qualification for becoming commander of the regular army was? PLSSS HELP!!How does the parallel plot structure create tension, or a sense of anxious anticipation?