The MAC protocol of Wireless LAN, such as CSMA/CA, differs from the CSMA/CD mechanism used in L2 VLAN and L3 VLAN. L2 VLAN is preferred over L3 VLAN in certain scenarios due to its flexibility and simplicity. The IEEE 802.17 MAC Protocol and IEEE 802.5 differ in key features, such as network architecture, data transmission method, and scalability.
The MAC protocol used in Wireless LAN, such as CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), differs from the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) mechanism employed in L2 VLAN and L3 VLAN. CSMA/CA is designed to avoid collisions by implementing a virtual carrier sensing mechanism, where stations wait for a clear channel before transmitting. In contrast, CSMA/CD detects collisions by monitoring the network during transmission. This distinction arises from the fundamental differences in wired and wireless network environments.
L2 VLANs (Layer 2 VLANs) are preferred over L3 VLANs (Layer 3 VLANs) in certain scenarios. L2 VLANs provide greater flexibility in grouping devices based on factors like switch ports, MAC addresses, or protocols. They operate at the data link layer (Layer 2) of the OSI model, allowing devices within the same VLAN to communicate directly with each other. L3 VLANs, on the other hand, operate at the network layer (Layer 3) and require routing between VLANs, which adds complexity to the network. L2 VLANs are often used in local environments where Layer 3 routing is not required, making them simpler to implement and manage.
The IEEE 802.17 MAC Protocol and IEEE 802.5 (Token Ring) differ in several key features. The IEEE 802.17 MAC Protocol, also known as Resilient Packet Ring (RPR), is designed for metropolitan area networks (MANs) and provides fault tolerance, load balancing, and fast recovery mechanisms. It uses a dual-ring architecture for data transmission and supports multiple service types over a single physical ring. In contrast, IEEE 802.5 Token Ring is a LAN technology that uses a token-passing mechanism to control access to the network. It operates in a star-wired ring topology and guarantees fair access to all devices on the network. IEEE 802.17 MAC Protocol offers greater scalability and flexibility, allowing for efficient utilization of network resources and high reliability in MAN environments, while IEEE 802.5 Token Ring is mostly used in legacy systems and has limitations in terms of scalability and speed.
Learn more about Wireless LAN here:
https://brainly.com/question/32116830
#SPJ11
What is a typical development cycle using a Version Control System (VCS)?(1 point)
Start a new branch, merge every functional version of the new feature as it is developed, send a pull request to the team and commit new features into the project.
Build a repository, upload files, publicize the project, evaluate proposed changes and merge approved changes into the project.
Send a pull request to the team, pull a new branch, commit every functional version of the new feature as it is developed and merge new features into the project.
Start a new branch, commit every functional version of the new feature as it is developed, send a pull request to the team and merge new features into the project.
Start a new branch, commit every functional interpretation of the new point as it's developed, shoot a pull request to the platoon and combine new features into the design.
What's Functional Version?
Programs are created using the functional programming paradigm, which involves applying and composing functions. rather of a series of imperative statements that alter the program's running state, this declarative programming paradigm defines functions as trees of expressions that collude values to other values.
The process of monitoring and managing changes to software law is known as interpretation control, generally appertained to as source control. Software technologies called interpretation control systems help software development brigades in tracking changes to source law over time. interpretation control systems enable software brigades to operate further fleetly and intelligently as development surroundings have increased. They're especially helpful for DevOps brigades because they enable them to speed up successful deployments and cut down on development time.
Learn more about VCS click here:
https://brainly.com/question/26533170
#SPJ1
Sean is considering a career in construction but is worried about job security. Which of the following arguments might help convince him to
enter the construction industry? (Select all that apply.)
Because it is site specific, construction work is impossible to outsource.
Even when the economy is poor, demand for building maintenance remains high.
The educational requirements vary depending on the specific construction job.
Construction work varies by season, but all workers have come to expect this.
Answer:
Because it is site specific, construction work is impossible to outsource.
Even when the economy is poor, demand for building maintenance remains high.
Construction work varies by season, but all workers have come to expect this.
Explanation:
Answer:
Even when the economy is poor, demand for building maintenance remains high.
Because it is site specific, construction work is impossible to outsource.
Explanation:
Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<
Answer:
1. Software de aplicación: Microsoft Word.
2. Software de diagnóstico: Speccy.
3. Software de sistema: Windows operating system (OS).
Explanation:
Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.
Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;
1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.
Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.
2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.
Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.
3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.
Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.
For a function lent_to: Book ↛ Person in a library system:
a) write down an expression for the set of library books on loan to a person p: Person.
b) What does your expression return, if p is not a member of borrowers where borrowers: P Person?
c) Write down a predicate to formalize the requirement that nobody shall be allowed to have more than five
books on loan
a) The expression for the set of library books on loan to a person p can be written as {b ∈ Book | lent_to(b) = p}, which means that the set contains all the books b in the Book collection that have been lent to person p.
b) If p is not a member of borrowers, which is the set of people who are eligible to borrow books, then the expression would return an empty set, as there would be no books on loan to someone who is not authorized to borrow.
c) The predicate that formalizes the requirement that nobody shall be allowed to have more than five books on loan can be written as ∀p ∈ Person: |{b ∈ Book | lent_to(b) = p}| ≤ 5, which means that for all persons p in the Person collection, the number of books b lent to them should not exceed 5.
To know more about library visit:
https://brainly.com/question/31622186
#SPJ11
Using a post-test while loop, write a program that lets the user enter 10 integers and then calculates and displays the product of only those that are odd. Compare the trace table for this program and the one that you wrote for your pre-test while loop exercise last class. CodeHs and Python 3
Answer:
# Initialize variables to keep track of the numbers and the product
count = 0
product = 1
# Loop until the user has entered 10 integers
while count < 10:
# Get an integer from the user
number = int(input("Enter an integer: "))
# If the number is odd, update the product
if number % 2 != 0:
product *= number
# Update the count
count += 1
# Display the product of the odd integers
print("The product of the odd integers is", product)
Explanation:
the program uses a post-test while loop, which means that the loop body is executed before the condition is tested. On each iteration, the program gets an integer from the user and updates the product if the number is odd. The loop continues until the user has entered 10 integers. Finally, the program displays the product of the odd integers.
The trace table for this program would be similar to the one for the pre-test while loop, but with some differences in the order of operations. In the post-test while loop, the loop body is executed before the condition is tested, whereas in the pre-test while loop, the condition is tested before the loop body is executed.
you need to install the package apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm. which of the following commands will perform the installation? (select two).
The correct commands to install the package are:
"sudo rpm -i apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm"
"sudo yum install apt-0.5.15cnc6-1.1.fc2.fr.i386.rpm"
These commands use different package managers to install the package. The first command uses the rpm package manager, which is commonly used in Red Hat-based distributions, such as Fedora and CentOS. The "-i" option instructs rpm to install the package, while the "sudo" command runs the installation with root privileges.The second command uses the yum package manager, which is also commonly used in Red Hat-based distributions. The "yum install" command automatically resolves dependencies and installs the required packages along with the specified package. Again, the "sudo" command runs the installation with root privileges. Overall, understanding how to install packages using different package managers is important for managing software on different operating systems.
Learn more about commands here;
https://brainly.com/question/31239178
#SPJ11
What are the most common malware types? How do you safeguard computer systems against malware? Why do you need to train users of computer systems to be vigilant about malware? What are some of the most recent malware attacks that you read or herd about in the news media?
Common Malware Types:
· Viruses
· Worms
· Trojans
· Ransomware
· Spyware
· Adware
Protections From Malware:
· Firewall Software
· Anti-Virus Software
if i cl/ear ch/at hist/ory on group/me on my comp.uter will it clear it on my phone
Answer: It is likely that this can happen.
Explanation:
If you really want to go the extra mile to clear it all, I may recommend that you clear it off the phone as well. Hope this helps.
Who is famous for his three laws of robotics?
Answer:
The Correct answer is Isaac Asimov
Explanation:
Science fiction already envisioned this problem and has suggested various potential solutions. They were designed to prevent robots harming humans.
FREE BRAINLIEST!!!
When recording a macro, the cursor will look like a _____ to indicate it is recording. A.microphone
B. Arrow
C. CD
D. cassette tape
Answer:
B
Explanation:
Answer:
When recording a macro, the cursor will look like a cassette tape to indicate it is recording. This answer has been confirmed as correct and helpful.
Explanation:
the correct answer is D
2- ¿Qué entiendes que son las tecnologías blandas y qué las tecnologías duras?
Answer:
En tecnología informática, tecnologías duras o "hardware" se refiere a todos los componentes físicos o partes que desempeñan un papel en una computadora. Así, son tecnologías duras aquellas que sean visibles y permitan a la computadora ejercer funciones que impliquen la interacción del usuario con los propios elementos del hardware, como el teclado, la impresora o los parlantes.
A su vez, las tecnologías blandas o "software" son el conjunto de programas que hacen posible el funcionamiento de la computadora y su utilidad como tal, como por ejemplo el sistema operativo y los diferentes programas específicos que se utilizan en ella.
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access (or availability) to anyone.
a. True
b. False
Answer:
The answer is "Option a".
Explanation:
Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.
The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".
Imagine that you had the assignment to create a website that would pair people with the ideal poster to put up in their room based on their personality. What information could you include in the logical data model for that program? List at least five items. Your answer:
Answer:
Here are six key components that you might include:
1. User Profile: This would include demographic information such as name, age and location. Also, preferences, hobbies, and interests, etc., to better understand their tastes and personalities.
2. Personality Quiz/Assessment Results: You could include a section that details the results of a personality quiz or assessment. This might contain personality traits, MBTI type, or results from another standardized personality test.
3. Poster Details: This would include a wide variety of information about each poster, such as dimensions, color scheme, subject matter (abstract, landscapes, celebrities, movies, etc.), style (minimalist, grunge, pop art, etc.), and price.
4. Purchase History: Keeping track of posters the user has purchased in the past can help predict what they might like in the future.
5. User Feedback: You may want to include a feedback mechanism where users can rate and review the posters they've received. This feedback could be used to refine recommendations for that user and others with similar tastes.
6. Preferences: Preferences for posters could also be directly taken from users, including favorite colors, themes (like nature, space, movies, music, etc.), preferred artists or styles, among others.
A logical data model can outline the specific data requirements for each project. However, should the project require it, it is made to integrate with different logical data models without any issues.
Thus, The creation and design of a logical data model can be done apart from the database management system. The kind of database management system used has only a small impact.
Data types with precise lengths and precisions are contained in data attributes. There are no primary or secondary keys specified in logical data modeling. At this stage of the data modeling process, it is necessary to check and refine connector specifications that were established before developing relationships.
A logical data model is comparable to a graphical representation of an industry's information needs.
Thus, A logical data model can outline the specific data requirements for each project. However, should the project require it, it is made to integrate with different logical data models without any issues.
Learn more about Logical data model, refer to the link:
https://brainly.com/question/31086794
#SPJ1
i need help debugging this code
public challenge 1_2b
{
/* fix all the errors in this code */
public static void main(String[] args)
{
System.out.print("Baby");
System.out.print("Shark");
System.out.print("Do Doo Do Do Do Doo");
}
}
audio element can be programmatically controlled from __________
The audio element can be programmatically controlled though a powerful and flexible control like JavaScript.
JavaScript provides a powerful and flexible way to control various aspects of web pages, including the audio element. With JavaScript, developers can access and manipulate the audio element's properties and methods to achieve dynamic control over playback, volume, duration, and other attributes of the audio. This allows for the creation of interactive and customized audio experiences on web pages.
By using JavaScript, developers can listen for events such as play, pause, and ended to trigger specific actions or behaviors related to the audio element. They can programmatically play or pause the audio, adjust the volume, seek to a specific time position, or even dynamically change the source of the audio file. This level of control enables the creation of rich audio applications, music players, interactive games, and other multimedia experiences on the web.
In summary, JavaScript provides the means to programmatically control the audio element, enabling developers to manipulate and customize its behavior and attributes dynamically within a web page or application.
Learn more about JavaScript here:
https://brainly.com/question/16698901
#SPJ11
why should information technology NOT be taught in school?
Explanation:
Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.
you have an azure web app named webapp1. you discover that backup options are unavailable for webapp1. you need to back up webapp1. what should you do first? select only one answer. modify the platform settings of webapp1. modify the application settings of webapp1. scale up the app service plan. scale out the app service plan.
The correct option regarding what you should do first for backup options is given by:
Scale up the app service plan.
What is the meaning of scaling up an application?Vertical scaling, also called scaling up, is equivalent to adding more resources to an instance of the application that you already have.
You can do this in multiple ways, such as adding more virtual machines or changing database performance levels, allowing you to enhance the performance of the application when there is high demand and then scaling down when the demand diminishes.
In this problem, there is a demand for backup, hence you have to scale up the application, and the correct option is given by:
Scale up the app service plan.
More can be learned about applications at https://brainly.com/question/13990715
#SPJ1
What Is What is the difference between system software and application software?
Answer:
Hope it helps have a nice day..
describe any three difficulties a company may face in running a business without having computer network
find the id, first name, and last name of each customer that currently has an invoice on file for wild bird food (25 lb)
To provide the ID, first name, and last name of each customer who currently has an invoice on file for wild bird food (25 lb), the specific data from the database or system needs to be accessed. Without access to the specific data source, it is not possible to provide the direct answer.
To find the required information, you would typically need to query a database or system that stores customer and invoice data. The query would involve joining tables related to customers and invoices, filtering for invoices with the specified product (wild bird food, 25 lb). The specific database schema and structure would determine the tables and fields involved in the query.
Here's an example SQL query that demonstrates the concept, assuming a simplified database schema:
```sql
SELECT c.id, c.first_name, c.last_name
FROM customers c
JOIN invoices i ON c.id = i.customer_id
JOIN invoice_items ii ON i.id = ii.invoice_id
JOIN products p ON ii.product_id = p.id
WHERE p.name = 'wild bird food' AND p.weight = 25;
```
In this example, the query joins the `customers`, `invoices`, `invoice_items`, and `products` tables, filtering for the specified product name ('wild bird food') and weight (25 lb). The result would include the ID, first name, and last name of each customer who has an invoice on file for that particular product.
Please note that the actual query may vary depending on the specific database schema and structure, and the query language being used.
Without access to the specific data and database structure, it is not possible to provide the direct answer to the query. However, the explanation and example query provided should give you an understanding of the process involved in retrieving the required information from a database or system.
To know more about database , visit;
https://brainly.com/question/28033296
#SPJ11
needed in 10 mins i will rate your
answer
3 6 9 12 Question 18 (4 points) Find the domain of the logarithmic function. f(x) = log = log (-[infinity], -2) U (7,00) (-[infinity], -2) (-2,7) 0 (7,00)
The domain of the given logarithmic function is `(7, ∞)`.[Note: We have used the base of the logarithmic function as `3`.]Therefore, the correct option is `(7, ∞)`
Given function is `f(x) = log3(x-6)-3`.We have to find the domain of the given function.Domain refers to the set of all possible values of x for which the given function is defined and real. For this, we need to consider the argument of the logarithmic function which should be greater than zero.`logb(x)` is defined only for `x>0`.
Therefore, the argument of the given logarithmic function should be greater than zero.`3(x-6)-3 > 0`⇒ `3(x-6) > 3`⇒ `x-6 > 1`⇒ `x > 7`Hence, the domain of the given logarithmic function is `(7, ∞)`.[Note: We have used the base of the logarithmic function as `3`.]Therefore, the correct option is `(7, ∞)`
To know more about logarithmic function refer to
https://brainly.com/question/30339782
#SPJ11
What is a typical org-type domain name for a univeristy in the United States?
a.net
b.org
c.gov
d.eduu
The typical org-type domain name for a university in the United States is ".edu" which is reserved for educational institutions. Option D is answer.
This domain is restricted to post-secondary institutions that are accredited by an agency on the U.S. Department of Education's list of nationally recognized accrediting agencies. These institutions are typically colleges, universities, and other educational institutions that offer degrees or certificates. This domain helps to ensure that the institution is recognized as a legitimate educational entity and provides a sense of trust and credibility to its website visitors. Therefore, option D, ".edu," is the correct answer.
You can learn more about domain name at
https://brainly.com/question/10314541
#SPJ11
your company purchases several windows 10 computers. you plan to deploy the computers using a dynamic deployment method, specifically provision packages. which tool should you use to create provisioning packages?
To create provisioning packages for deploying Windows 10 computers using a dynamic deployment method, you should use the Windows Configuration Designer tool.
Windows Configuration Designer (formerly known as Windows Imaging and Configuration Designer or Windows ICD) is a powerful graphical tool provided by Microsoft to create provisioning packages. It allows you to customize and configure various settings, policies, and applications to be applied during the deployment process.
Using Windows Configuration Designer, you can create provisioning packages that define the desired configurations for Windows 10 computers. These packages can include settings such as network configurations, security settings, regional preferences, installed applications, and more.
The tool provides an intuitive interface that guides you through the process of creating the provisioning package. You can select the desired configuration options, customize settings, and preview the changes before generating the package.
Once the provisioning package is created using Windows Configuration Designer, it can be applied during the deployment process to configure multiple Windows 10 computers with consistent settings and configurations. The provisioning package can be installed manually or through automated deployment methods like Windows Autopilot or System Center Configuration Manager (SCCM).
In summary, to create provisioning packages for deploying Windows 10 computers using a dynamic deployment method, you should use the Windows Configuration Designer tool. It enables you to customize settings and configurations, which can be applied during the deployment process to ensure consistent and efficient provisioning of Windows 10 computers.
Learn more about Designer here
https://brainly.com/question/32503684
#SPJ11
Why was slavery more common in South Carolina than in North Carolina?
Check all of the boxes that apply.
Answer:
South Carolina, more south the more farms and agriculture so more farms mean's more workers needed.
Explanation:
A website that relies heavily on word of mouth might consider including what element on its website.
A website that relies heavily on word of mouth might consider including link to social media accounts on its website.
What is website?A website is a collection of web pages and related content that are identified by a common domain name and published on at least one web server. All publicly accessible web pages together form the World Wide Web. There are also private websites that can only be accessed on a private network, such as the company's internal website for its employees.
Websites are often dedicated to a specific topic or purpose, such as news, education, business, entertainment, or social networking. Hyperlinks between web pages guide website navigation, usually starting with the home page. Users can access websites on a variety of devices, including desktops, laptops, tablets, and smartphones. The application used on these devices is called a web browser.
Learn more about website https://brainly.com/question/28431103
#SPJ4
Find a Greedy algorithm for the following problem: Given n arrays of size m each. Find the
maximum sum obtained by selecting a number from each array such that the elements selected
from the i-th array are more than the element selected from (i-1)-th array. If maximum sum
cannot be obtained, then return 0. Example: A[n][m] = {{1, 7, 3, 4},{4, 2, 5, 1},{9, 5, 1, 8}}
where n=3 and m=4 à Output : 18 = 4+5+9
The algorithm has been written in the space that we have below
How to write the algorithm#include <iostream>
#include <vector>
int findMaxSum(const std::vector<std::vector<int>>& arrays) {
int n = arrays.size();
int m = arrays[0].size();
int maxSum = 0;
for (int i = 0; i < m; i++) {
int currentMax = arrays[0][i];
int sum = currentMax;
for (int j = 1; j < n; j++) {
int maxElement = -1;
for (int k = i + 1; k < m; k++) {
if (arrays[j][k] > currentMax) {
maxElement = arrays[j][k];
break;
}
}
if (maxElement == -1) {
return 0; // No valid selection of numbers
}
sum += maxElement;
currentMax = maxElement;
}
if (sum > maxSum) {
maxSum = sum;
}
}
return maxSum;
}
int main() {
std::vector<std::vector<int>> arrays = {
{1, 7, 3, 4},
{4, 2, 5, 1},
{9, 5, 1, 8}
};
int maxSum = findMaxSum(arrays);
std::cout << "Maximum Sum: " << maxSum << std::endl;
return 0;
}
Read more on algorithm here https://brainly.com/question/24953880
#SPJ4
What's ur fav Billie ellish song?
Answer:
my strange addiction.
Explanation:
MARK AS BRAINLIST!!
Answer:
Bad Guy
Explanation:
who wants to play genshin?
Answer:
Sure! What server are you on tho?
Explanation:
What are some innovative research ideas for Onshore/Offshore hybrid wind turbines?
I was thinking whether it could be integrated with AI technologies, Pv Cells, thermoelectric plates, piezoelectric etc etc
please give me some inspirations
Some innovative research ideas for onshore/offshore hybrid wind turbines include integrating AI technologies for advanced control and optimization, incorporating PV cells for hybrid energy generation, utilizing thermoelectric plates for waste heat recovery, and exploring the potential of piezoelectric materials for vibration energy harvesting.
One innovative research idea is to integrate AI technologies into onshore/offshore hybrid wind turbines. AI algorithms can be used to optimize turbine performance by analyzing real-time data and making adjustments to maximize energy production and efficiency. AI can also enable predictive maintenance, allowing for proactive identification of potential issues and minimizing downtime.
Another idea is to incorporate photovoltaic (PV) cells into the hybrid wind turbines. By combining wind and solar energy generation, these turbines can generate power from both sources, maximizing energy output and improving the overall reliability and stability of the system.
Additionally, exploring the use of thermoelectric plates in hybrid wind turbines can enable the recovery of waste heat generated by the turbine. This waste heat can be converted into electricity, enhancing the overall energy efficiency of the system.
Furthermore, researchers can investigate the application of piezoelectric materials in hybrid wind turbines for vibration energy harvesting. These materials can convert mechanical vibrations caused by wind turbulence into electrical energy, supplementing the power output of the turbine.
These innovative research ideas highlight the potential for integrating AI technologies, PV cells, thermoelectric plates, and piezoelectric materials into onshore/offshore hybrid wind turbines to enhance their performance, energy generation capabilities, and efficiency.
Learn more about AI technologies here:
https://brainly.com/question/30089143
#SPJ11
Give the steps involved in using Corel draw to make simple design of drawing the Nigerian flag
If you want to make a straightforward Nigerian flag design using CorelDRAW, adhere to the subsequent guidelines.
The Steps to DesignTo commence, launch CorelDRAW and generate a fresh file that meets your preferred size criteria.
Choose the Rectangle tool located in the toolbox and utilize it to create a rectangular shape that mirrors the flag's backdrop.
Reutilize the Rectangle tool to create a diminutive rectangle at the center, which represents the vertical white band.
Opt for the Circle tool and sketch a circle at the center of the white band that signifies the emblem.
"Assign the suitable shades to every component, wherein the two vertical stripes should be colored in green and the middle stripe and coat of arms must be coated in white."
Using appropriate tools and techniques, include any additional details, such as the emblem of the coat of arms or inscriptions, as needed.
Ensure to store the document in the preferred format, such as PNG or JPEG, and if necessary, extract it for future application.
Read more about graphics design here:
https://brainly.com/question/28807685
#SPJ1