A server process in Host B has a welcoming socket at port 977. What will trigger the server process to create a connection socket?

Answers

Answer 1

Answer:

Explanation:

This connection socket will be created when Host B receives a TCP SYN segment that contains the destination port number 977. This means that there is data that is trying to enter through that port number, as a welcoming socket this destination is available and when data requests access through it the OS creates a connection socket using Host B in order to allow access to the TCP SYN segment.


Related Questions

PLS HELP IF U KNOW A LOT ABT SOCIAL MEDIA

Idk what’s going on with Pinterest but I can’t follow ppl, dm ppl or comment on stuff and it says an error (attached image) what can I do to fix this? Also I’ve tried logging in and out and I’ve tried deleting the app. Btw it’s on a business account

Answers

Answer:

Its probably your computer

Explanation:

Try restarting, shutting down and starting back up your computer/laptop. Or just move to a different device.

can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.

A)Global Communication


B)Social Media Platform


C)Internet


D)Technological Advancement

Answers

Answer:

Internet

Explanation:

just took the test and got A

Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts all packets to all hosts so the recipient will be sure to see its traffic. C. makes routing decisions one at a time as a packet crosses individual networks. D. uses port numbers to optimize the transmission of streaming media.

Answers

Answer:

A. precomputes the most efficient route and uses it to ensure rapid packet delivery.

Explanation:

In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.

For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.

The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?

Answers

Answer:

Scheduling.

Explanation:

A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.

In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.

Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).

Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.

Answers

Answer:

The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm

Explanation:

The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.

For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)

It will work as follows (recall that the memory partitions are in order and must remain so):

A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next

B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100  KB, 350 KB, 200 KB, 750 KB, 125 KB), next  

C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB)  next

D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB)  next

E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB,  200KB, 17KB, 125KB)

One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.

Cheers

E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use

Answers

D or b
I’m pretty sure sorry if I’m wrong

E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

As we know,

You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.

Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2

It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False

Answers

Answer:

False

Explanation:

would be blocked from server

The single-cycle datapath conceptually described in this section must have separate instruction and data memories, because:________. a. the formats of data and instructions are diff erent in MIPS, and hence different memories are needed. b. having separate memories is less expensive. c. the processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycled. the formats of data and instructions are different in MIPS, and hence different R-type instructions are needed .

Answers

Answer:

C. The processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycle

Explanation:

Processors require instructions and data which are retrieved from data memories for processing, but it cannot access two or receive two both processes as only a port is used for accessing data and another for receiving instructions. In fact, a single-cycle or single-clock processor cannot use a resource more than once.

Why is it useful to have more than one possible path through a network for each pair of stations?

Answers

Answer:

Because if one path is crowded, then there is always another path to make it less crowded and it is more convenient

Explanation:

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answers

Full question:

Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque 2 elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3

Answer and Explanation:

If you instantiate a capacity of 10 for the queue, you have the queue a capacity of not more than 10 values.

To enqueue means to add an element to the array(if it's not full, n<10)

To dequeue means to delete an element from the array or queue(if n! =0)

From the question, for example:

We create a queue of capacity 10:

Queue q(10);

We add elements/enqueue 5 elements to the queue :

q.queueEnqueue(10);

q.queueEnqueue(5);

q.queueEnqueue(8);

q.queueEnqueue(9);

q.queueEnqueue(2);

If we print this out:

q. queueDisplay()

We would get:

10, 5, 8, 9, 2

We remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

We print it out:

q. queueDisplay()

8 ,9, 2

We observe that deletion/dequeue starts from the front/first index.

We are left with indices 2, 3, 4 or 2 to 4

Note: the above methods/ functions and objects used are merely for example purposes. The queue uses a floating front design approach.

What is the extension of Qbasic ?​

Answers

Answer:

bas

Explanation:

In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension should a user give to schemas?

--.xml
--.xsl
--.xslt
--.xsd

Answers

Answer:

You can use your XML parser

Explanation:

hope this helps!

Find the minimum, maximum, and average grade of final exams in sections taught by Todd Smythe.

Answers

Answer:

A sample of the statement is written below

SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"

Explanation:

To find the Minimum, maximum and average grade of final exams in the sections taught by Todd Smythe. we will write a statement

Using the select to get the required data using the functions ; MIN , MAX , AVG and the WHERE clause for the condition

A sample of the statement is written below

SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"

what are the characteristics of 1st generation computers​

Answers

Answer:

Used vacuum tubes for circuitry.

Electron emitting metal in vacuum tubes burned out easily.

Used magnetic drums for memory.

Were huge, slow, expensive, and many times undependable.

Were expensive to operate.

Were power hungry.

Explanation:

 

Answer:

Characteristics of first generation computers:

Explanation:

1)First generation computers used vacuum tubes.

2)Speed was slow and memory was very small.

3)They were huge in size taking up entire room.

4)They consumed a lot of power and generated so much heat.

5)Machine language was used in these computers.

6)Output was obtained on printouts through electric typewriter.

7)Input was based on punched cards.

8)First generation computers were expensive and unreliable.

3. You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this?
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
b. Buy the apps a second time from your tablet.
c. Back up the apps on your phone to your SD card and then move the SD card to your tablet and transfer the apps.
d. Call Google support and ask them to merge the two Google accounts into one.

Answers

Answer:

a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.

Explanation:

One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?

Answers

Explanation:

Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:

Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.

This elementary problem begins to explore propagation delay and transmis- sion delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B

a. Express the propagation delay, dprops in terms of m and s

b. Determine the transmission time of the packet, drans, in terms of L and R.

c. Ignoring processing and queuing delays, obtain an expression for the end-

d. Suppose Host A begins to transmit the packet at time t = 0. At time t = dtrans'

e. Suppose drop is greater than dran . At time t = d, ans, where is the first bit of

f. Suppose dprop is less than dtrans. At time t = dtrans, where is the first bit of

g. Suppose s = 2.5-108, L = 120 bits, and R = 56 kbps. Find the distance m so that dprop equals drans

Answers

Answer:

A. dprops = m /s seconds.

B. drans = L / R seconds.

C.  delay(end −to−end) =  (m /s + L / R) seconds.

D. The bit has just been sent to Host B or just left Host A.

E. The first bit is in the link and has not reached Host B.

F. The first bit has reached Host B.

G. m = 535.714 km.

Explanation:

The transmission time or delay of packets in a network medium is the packet size L, divided by the bit rate R (in seconds). The propagation time or delay is the ratio of the distance or length of the transmission cable, m, and the propagation speed of the cable, S (in seconds).

The end-to-end delay or the Packet delivery time is the total delay in transmission, which is the sum of the propagation delay and the transmission delay.

To get the distance where the propagation delay is equal to the transmission delay;

distance (m) = L /R  

= (120/56 ×10^3) 2.5 ×10^8   = 535.714 km

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer

Answers

The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.

In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.

The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.

On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.

The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.

Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.

For more questions on Reviewer, click on:

https://brainly.com/question/30517194

#SPJ8

please help anyone plss the code for the html to create an website plsss anyone PLSSSSS ​and i will mark u as brainliest forever

Answers

Answer:ater on, in Chapter 9, you'll learn to put web pages online so anyone with a web ... Every web page you build along the way will be a bona fide HTML document. ... That means that the raw code behind every web page you create will consist entirely ... punctuation marks, and everything else you can spot on your keyboard).

Explanation:

You use the same five shell functions every day and are looking for a way to ensure they are available as soon as you log into your account. What can you do?a. Make them residual system variables.b. Make them permanent environment variables.c. Load them via your login script.d. Make them permanent functions by adding them to the function directory.

Answers

Answer:

.c. Load them via your login script.

Explanation:

Given that using functions in shell scripts enhances programming output and login script comprises the functions and statements required to effectively execute at any given time the user logs into their account.

Hence the moment these functions are formulated, they are then executed through a single command statement thereby reducing the time of re-writing another set of code repeatedly in every program.

Therefore, in this case, what you can do is to "Load them via your login script."

how microsoft excel helps students?

Answers

Answer:

FASLE

Explanation:

For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2

Answers

import math

def getResults(r):

   return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))

print(getResults(3.5))

I hope this helps!

what is the advantages of your solutions ​

Answers

Answer:

One of the key benefits of using IT solutions is that they provide the opportunity to use the latest technology in the market. This is because the IT solution always offers the best equipment and technologies in the market, and also, they are upgraded at zero additional costs.

Explanation:

plsss help anyone PLSSSSS ​

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to write HTML code for the given sub-questions. In each sub-question different scenario is given. So, the answer to these questions is given below in the order they asked.

1. In this question it is asked to write a code of 5 students' name in a paragraph with a different color that make them unique.

<html>

<body>

<p style="color:red;">Student A</p>

<p style="color:blue;">Student B</p>

<p style="color:black;">Student C</p>

<p style="color:orange;">Student D</p>

<p style="color:green;">Student E</p>

</body>

</html>

2. In it, the below is given code show an ordered list of subjects that you're offering.

<html>

<body>

<h2>An ordered HTML list</h2>

<ol>

 <li>Introduction to Computing</li>

 <li>Communication Skills</li>

 <li>Software Designing</li>

</ol>  

</body>

</html>

3. The below-given HTML code shows the unordered list of parts that make up the computer.  

<html>

<body>

<h2>An unordered HTML list</h2>

<ul>

 <li>CPU</li>

 <li>RAM</li>

 <li>Motherboard</li>

 <li>Mouse</li>

 <li>Keyboard</li>

 <li>Monitor</li>

</ul>  

</body>

</html>

Clyde Clerk is reviewing his firm’s expense reimbursement policies with the new salesperson, Trav Farr. "Our reimbursement policies depend on the situation. You see, first we determine if it is a local trip. If it is, we only pay mileage of 18.5 cents a mile. If the trip was a one-day trip, we pay mileage and then check the times of departure and return. To be reimbursed for breakfast, you must leave by 7:00 a.m., lunch by 11:00 a.m., and have dinner by 5:00 p.m. To receive reimbursement for breakfast, you must return later than 10:00 a.m., lunch later than 2:00 p.m., and have dinner by 7:00 p.m. On a trip lasting more than one day, we allow hotel, taxi, and airfare, as well as meal allowances. The same times apply for meal expenses." Write structured English for Clyde’s narrative of the reimbursement policies. Draw a decision tree.

Answers

Answer:

The answer is described in the image.

Explanation:

The firm is responsible for all expenses made by it's employees, so for a local trip, the cost of gas relative to the mileage covered during the journey is paid for ( 18 cents per mileage).

If it is not a local trip, then it is a one-day trip, so the firm pays for the mileage and the cost of the meals not taken in the company, which depends on the departure and return/arrival time. If the departure and return time is 7am to 10am, the employee is paid for breakfast, if the departure and return is 11am to 2pm then the employee is paid for lunch, and for dinner, 5pm to 7pm.

Is this right? I’m not sure

Answers

Yeah indeed it is. Good job!!

For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (System.in); 2. int max =

Answers

Answer:

The answer is "Option d".

Explanation:

Please find the complete question in the attached file.

A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection of text with schema tags into a presentable document that shows data in a way that is pleasant and easily understood.

Answers

Answer: language

Explanation:

Which of these can be sorted with a bubble sort?

['red', 'blue', 'green', 7]

{41:5,32:10, 20: 234}

​[7, 10, 2.5, 1.566]

[1, 2.5, 'book']

Answers

C because a bubble sort only compares numbers

Answer:

C

Explanation:

ed 2021

Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The first digit identifies the product category, the nextfive digits identify the manufacturer, the following five identify the particular product, andthe last digit is acheck digit. The check digit is determined in the following way:
• Beginning with the first digit multiply every second digit by 3.
• Sum all the multiplied digits and the rest of the digits except the last digit.
• If the (10 - sum % 10) is equal to the last digit, then the product code is valid.
• Otherwise it is not a valid UPC.The expression is:sum= 3.x1+x2+ 3.x3+x4+ 3.x5+x6+ 3.x7+x8+ 3.x9+x10+ 3.x11where the x’s are the first 11 digits of the code.
If you choose to add the last digit also in the second step and if the sum is a multiple of 10,then the UPC is valid. Either way, you still need to perform the modular division to checkwhether the given number is a valid code.In this problem, you need to use either a string or long long integer type for the product codebecause it is 12 digits long. If you use string, you can convert one character substring of thestring in to a single digit integer from left to right using the function stoi(str.substr(i,1)).This way you do not need to get last digit of the number and then divide the number by 10.
in c++
problem 3
Translate the following pseudocode for randomly permuting the characters in a string into a C++ program. Read a word. repeat word.length() times Pick a random position i in the word, but not the last position. Pick a random position j > i in the word. swap the letters at positions j and i. Print the word. Please work on this problem after we learn to generate random numbers in the class which is on Wednesday the latest. These problems only deal with simple loop while, for and do loops. You will get a second set of problems next week on nested loops.

Answers

Answer:

#include <iostream>

#include <cmath>

using namespace std;

int main(){

   string upc;

   char last;

   cout<< "Enter UPC number: ";

   cin >> upc;

   if (upc.size() == 12){

       last = upc[-1];

   } else{

       return 0;

   }

   cout<< last;

   char myArr[upc.length()];

   for (int i = 0 ; i < upc.substr(0,11).length(); ++i){

       if (upc[i]%2 != 0){

           myArr[i] = upc[i] * 3;

       }

       else{

           myArr[i] = upc[i];

       }

   }

   int sum = 0;

   for (int x = 0; x < sizeof(myArr); ++x){

       sum += (int)myArr[x] - '0';

   }

   if (sum% 10 == last){

       cout<<"UPC number is valid";

   }

   else{

       cout<<"Invalid UPC number.";

   }

}

Explanation:

The UPC number in the c++ source code input must be 12 digits long for the rest of the code to execute.  The code checks the validity of the number by comparing the reminder of the sum division with the last digit in the UPC number.

Other Questions
Fill in the blanks.1. Patricia ___ a Cuzco.2. T ___ a Iquitos.3. Gregorio y yo___ a Lima.4. Yo ___ a Trujillo.5. Mi padre ___ a Lima.6. Nosotras ___ a Cuzco.7. l ___ a Machu Picchu.8. Usted ___ a Nazca. Am I right vote you brainiest Given f(x) = 4x-6 and g(x) = f(2x) what is an equation for the function g?a) g(x) = 2(4x-6)b) g(x) = 4x-12c) g(x) = 8x-6d) g(x) = 2(4x-6)-6 p-1/4=5 1/4(Change mixed number into a improper fraction first.)PLZ HELLP WILL GIVE BRAINLY When lost fluid is not replaced adequately a heat stroke can result be hypothermia can result c dehydration can result D emphysema can result For this assignment, you will create a calendar program that allows the userto enter a day, month, and year in three separate variables as shown below.Day:Month:Year:Then, your program should ask the user to select from a menu of choicesusing this formattingMenu:1) Calculate the number of days in the given month.2) calculate the number of days left in the given year.I would really appreciate it if someone could help me on this. Reorder the following :-4. costs to stay It - a youth hostelat -less- than- at a big hotel._______________________________________________________ what is 2x + 27 = -3 (x+5) + 7 6. Write an equation that represents thenumber below. Compare Dantes ideas about justice to ideas about justice in contemporary America. In what ways have our ideas about how to address immoral behavior changed since the medieval era? Your answer should be at least one hundred words. Why does sin540.809cos36 in a right triangle?A 54 and 36 are complementary angles in the same right triangle. sin54 is the ratio of the opposite leg and the hypotenuse and cos36 is the ratio of the adjacent leg and the hypotenuse. In this triangle, the opposite leg of 54 and the adjacent leg of 36 are the same leg in the triangle.B 54 and 36 are complementary angles in the same right triangle. sin54 is the ratio of the adjacent leg and the hypotenuse and cos36 is the ratio of the opposite leg and the hypotenuse. In this triangle, the adjacent leg of 54 and the opposite leg of 36 are the same leg in the triangle.C 54 and 36 are supplementary in the same right triangle. sin54 is the ratio of the opposite leg and the hypotenuse and cos36 is the ratio of the adjacent leg and the hypotenuse. In this triangle, the opposite leg of 54 and adjacent leg of 36 are the same leg in the triangle.D 54 and 36 are supplementary in the same right triangle. sin54 is the ratio of the adjacent leg and the hypotenuse and cos36 is the ratio of the opposite leg and the hypotenuse. In this triangle, the adjacent leg of 54 and opposite leg of 36 are the same leg in the triangle. To change Celsius temperatures to Fahrenheit temperatures, you can use the formula F = 95C + 32. Which answer is the best first step to solve the equation for C? Jordan is walking her dog down the street. The dog does his business on the lawn ofher neighbor, but Jordan does not pick it up. A police officer driving by sees this and stops her. Which of the below would NOT be a violation of the 8th Amendment?Taking her dog from her and sending it to the pound Arresting her and putting her in jail for a week Explaining to her the importance of keeping the community cleanFining her $4,000 for not following the city law on picking up dog waste Solve for h.-18 + h = 28 Please look at the slope and write the equation for each problem...Answer this correctly, troll and you will get reported. Plssss helpppp ASAPPwill mark BRAINLIEST!!! Which set of coordinates describes a function What is the estimate of the sum of 165, 123, 376 and 134 using front end estimation? A. 600 B. 700 C. 800 D. 900 100 ponits!!!Mafic rocks are...a.high in silica contentb.low in Fe & Mg contentc.high in Fe & Mg contentd.low in silica content How many moles of CO2COX 2 will be produced from 97.0 g97.0 g97, point, 0, start text, space, g, end text of C3H8CX 3 HX 8 , assuming O2OX 2 is available in excess?