This computing technology is used in newer debit and credit cards to process transactions. Select one: a. RFID chips. b. magnetic strips. c. QR codes.

Answers

Answer 1

The computing technology that is used in newer debit and credit cards to process transactions is RFID chips. Therefore, option (a) RFID chips is the correct answer.

What is RFID?

Radio-frequency identification (RFID) is a technology that uses radio waves to automatically identify and track tags attached to objects. Tags contain electronically stored information and are used for various purposes, including inventory management, tracking assets, and security authentication.

In debit and credit cards, RFID chips use electromagnetic fields to communicate with card readers. When the card is held near an RFID reader, the reader sends a signal to the RFID chip, which then uses the energy from the signal to transmit the card's information wirelessly back to the reader.

This process is faster and more secure than traditional magnetic strip technology and helps to prevent fraud.

So, the correct answer is A

Learn more about radio frequency identification at

https://brainly.com/question/29554696

#SPJ11


Related Questions

how has input device helped u

Answers

Answer:

Today, input devices are important because they are what allows you to interact with and add new information to a computer. For example, if a computer had no input devices, it could run by itself but there would be no way to change its settings, fix errors, or other various user interactions

Explanation:

Answer: well it allows u to ad new info to your pc/ basically an easier way to transfer from one device to another

Explanation: i would give a better answer but i'm feeling lazy today srry

Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on. Group of answer choices predictive modeling dashboards query reports application generators

Answers

Business analytics refers to the practices of using tools, techniques, and methodologies to investigate past business performance and generate insights to aid in decision-making. Analytics software are used to gain insight into data and provide decision makers with information they can act on. The process of using analytics tools to gain insight into data involves different tools such as predictive modeling, dashboards, query reports, and application generators.

Business analytics is a useful tool for any organization that needs to make data-driven decisions. Businesses today collect vast amounts of data from various sources and need to make informed decisions based on the insights gained from the data. Analytics tools such as predictive modeling, dashboards, query reports, and application generators help businesses to gain insights into data and use the insights gained to make informed decisions. Predictive modeling is the process of using data, statistical algorithms, and machine learning techniques to identify the likelihood of future outcomes based on historical data. Dashboards provide a visual representation of data in real-time, giving decision-makers an instant snapshot of the organization's performance. Query reports are used to extract data from databases and provide a summary of the data to help decision-makers identify trends and make informed decisions. Application generators are used to generate applications that automate the process of data analysis and visualization. These tools are essential for businesses that need to gain insights into vast amounts of data and use the insights gained to make informed decisions. In conclusion, Business analytics uses predictive modeling, dashboards, query reports, and application generators to gain insight into data and provide decision-makers with information they can act on. These tools are essential for any organization that needs to make data-driven decisions. By using analytics tools, businesses can identify trends, make informed decisions, and improve their performance.

To learn more about Business analytics, visit:

https://brainly.com/question/30259543

#SPJ11

Which mynav module serves as the source for sales and delivery content, assets, and intellectual property across industries??
possible answers (only one right):
a) industry module
b) cloud advisor
c) green cloud module
d) talent advisor

Answers

The Industry Module of the mynav module serves as the source for sales and delivery content, assets, and intellectual property across industries.

What is industry module myNav?

myNav is known to be one that simulates how a given solutions will act at scale, and it also validates it's the right in regards to fitting in for the first time.

Hence, The Industry Module of the mynav module serves as the source for sales and delivery content, assets, and intellectual property across industries.

Learn more about mynav from

https://brainly.com/question/27117515

#SPJ1

List at least three security design principles that should be used in secure software design.
For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).

Answers

Secure software design principles are crucial for ensuring that software systems are protected from malicious attacks. Here are three security design principles that should be used in secure software design: Least privilege;  Defense in depth;  Fail-safe defaults.



1. Least privilege: The principle of least privilege states that users should only be given the minimum access necessary to perform their tasks. This means that software systems should be designed to limit access to sensitive data and functionality, and that users should only be given access to what they need to do their jobs.

2. Defense in depth: Defense in depth is a principle that involves layering security measures to create multiple lines of defense against attackers. This means that software systems should be designed to include multiple security controls, such as firewalls, intrusion detection systems, and encryption, to protect against different types of attacks.

3. Fail-safe defaults: Fail-safe defaults are settings that are designed to protect the system in the event of a failure. For example, software systems should be designed to default to the most secure settings possible, such as disabling unused services and features, to prevent attackers from exploiting vulnerabilities.

By following these security design principles, software developers can create systems that are more resilient to attack and better able to protect sensitive data and resources.

To know more about software design visit:

https://brainly.com/question/30732598

#SPJ11

Which is an aspect of structural-level design? A. scaling B. player-adjusted time C. difficulty level D. radiosity

Answers

Answer:

D. radiosity

Explanation:

This is because in computers the definition of radiosity is an application of the elemental method of solving the equation for other particular scenes with surfaces that gradually reflects light diffusely.

Answer:

its d

Explanation:

im right

For questions 2-4, consider the following code:



if month == 7:

if day <= 15:

print("First half of the month")

else:

print("Second half of the month")

else:

print("Not in July")



What is the output if month = 7 and day = 14?
Group of answer choices

Nothing is output

Not in July

First half of the month

Second half of the month

Answers

Answer:

First half of the month

Explanation:

first if statement is true; nested if statement is true so the statement print("First half of the month") is executed

800,000= 180,000(P/AD, i,5) + 75,000(P/F,i,5) I want to find interest rate (i)
Would you let me know how to calculate this using Excel?

Answers

here is how to compute the above using Excel.

How to calculate the above

Open a new Excel spreadsheet and enter the following values in the cells:

Cell A1: 800,000 (Total amount)

Cell A2: 180,000 (Payment at the end of each period)

Cell A3: 75,000 (Payment at the beginning of each period)

Cell A4: 5 (Number of periods)

In cell A5, enter an initial guess for the interest rate (i). For example, you can start with 0.1 (10%).

In cell B1, enter the formula =A2*PMT(A5,A4,0) to calculate the present value of the periodic payments at the end of each period.

In cell B2, enter the formula =A3*PMT(A5,A4-1,0) to calculate the present value of the periodic payments at the beginning of each period.

In cell B3, enter the formula =A1 - B1 - B2 to calculate the remaining balance.

In cell B4, enter the formula =RATE(A4, B2, B1) to calculate the interest rate.

Learn more about Excel Formula at:

https://brainly.com/question/29280920

#SPJ1

in the analytical hierarchy process (ahp) programming model, what is the first thing placed into a hierarchy to facilitate the decision-making process?

Answers

In the analytical hierarchy process (ahp) programming model, the first thing placed into a hierarchy to facilitate the decision-making process is choosing the leader.

The analytical hierarchy process (AHP), sometimes known as the analytical hierarchy process, is a structured method based on arithmetic and psychology for organizing and analyzing complex decisions.

Thomas L. Saaty created it in the 1970s; in 1983, he collaborated with Ernest Forman to create the software Expert Choice, and since then, AHP has undergone a great deal of research and development. It is a precise method for calculating the relative importance of the various decision-making factors.

Through pair-wise comparisons, the experiences of individual experts are used to assess the relative magnitudes of components. Using a specially created questionnaire, each respondent compares the relative value of each pair of elements.

To know more about hierarchy process click here:

https://brainly.com/question/14919512

#SPJ4

the ____ is a collection of linked documents, graphics, and sounds.

Answers

The World Wide Web (WWW) is a collection of linked documents, graphics, and sounds that are accessible over the internet.  The World Wide Web (WWW) is a system of interlinked hypertext documents accessed through the Internet.

It is a global system of interconnected hypertext documents, which are commonly referred to as web pages.

These web pages are written in HTML (Hypertext Markup Language) and are linked through hyperlinks, allowing users to navigate and access information by simply clicking on the links.

The web also encompasses various media types, such as images, videos, graphics and sounds audio files, making it a rich and diverse platform for sharing and accessing multimedia content from around the world.

To learn more about graphics: https://brainly.com/question/28350999

#SPJ11

What are the three primary components of an inbox?
O the Task List, the Calendar, and the Status bar
O the Task List, the Calendar, and the Reading Pane
o the message header, the Folder Pane, and the Reading Pane
O the message header, the Status bar, and the Reading Pane

Answers

The three primary components of an inbox are the message header, the Folder Pane, and the Reading Pane. Hence option c is correct.

What is inbox?

Inbox is defined as a location in an email client or online email account where email messages are received. You may view and manage received emails in your inbox. The sender's name, the message's subject, and the date it was received are provided with each email. You can find the Inbox in the Message List. Opening in the Reading Pane are emails. You have more options for organizing emails with the ribbon.

A computer or smartphone's inbox is a folder where new emails are saved. An email program's inbox is a repository where incoming messages are stored. Email applications may provide several inboxes into which new communications are filtered after being examined for content

Thus, the three primary components of an inbox are the message header, the Folder Pane, and the Reading Pane. Hence option c is correct.

To learn more about inbox, refer to the link below:

https://brainly.com/question/208303

#SPJ2

Your ghost hunting group is recording the sound inside a haunted Stanford classroom for 20 hours as MP3 audio files. About how much data will that be, expressed in GB

Answers

Answer:

1.152 GB if it will be at 128 kbps quality

Explanation:

So, let's say you choose your mp3 be 128 kbps (kilobits per second).

One byte is 8 bits. So 128 kbps = 16 kilobytes per second.

There is 60*60 seconds in one hour. So 16*60*60 = 57.6 megabytes per hour

Multiply by 20 hours to get your answer: 57.6*20 = 1152 MB = 1.152 GB.

20 hours as MP3 audio files would be about 1.2 GB of data

MP3 audio uses about 1 MB per minute.

20 hours = 60 minutes/hour * 20 hours = 1200 minutes.

Since MP3 audio uses about 1 MB per minute, hence for 1200 minutes:

1200 minutes = 1200 minutes *   1 MB per minute = 1200 MB (1.2 GB)

20 hours as MP3 audio files would be about 1.2 GB of data

Find out more at: https://brainly.com/question/24456970

PLZ HELP

Alejandro decided to save some time by copying and pasting code into the editor, but the program didn’t work. What is the most likely explanation for this?


A.

There was no binary converter.


B.

Interpreters can’t read symbols from a different font.


C.

There was no code editor available.


D.

There was an error in the original code.

Answers

Answer:

B needed points but its right

;)

Explanation:

A professional interpreter's job is to make it possible for two or more parties who speak different languages to communicate with one another. Because of this, qualified interpreters are limited to translating spoken words. Thus, option B is correct.

What Interpreters can’t read symbols from a different font?

Their responsibilities include accompanying clients on trips to help them communicate with others who speak different languages, translating speeches or presentations for audiences that are multilingual, and assisting with the conversion of spoken words into written communications.

Add > Symbol > Additional Symbols. Select the symbol in the resulting window, but also double-check that the font is set to your usual font on the line at the upper left. After that, type your shortcut. The symbol ought to display in the specified font when you use the shortcut.

Therefore, Interpreters can’t read symbols from a different font.

Learn more about font here:

https://brainly.com/question/7971447

#SPJ2

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and errors of computer when you detached the following Keyboard-PS/2 Mouse-PS/2 Hard disk- IDE cable Floppy disk drive-IDE cable Room disk-IDE CABLE

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and

Answers

Answer: NO MORE TYPING! NO MORE CLICKING! NO MORE MEMORY! NO MORE OPERATING!

Which of the following BEST describes Computer Science (CS)?


It refers to meeting the technological needs of businesses.


It has to do with collecting and utilizing data.


It is the study of computers and computing concepts.


It refers to everything that involves computers.

Answers

Answer:

Explanation:

It has to do with collecting and utilizing data

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

T/F: Email spoofing rarely is used in virus hoaxes and spam.

Answers

False. Email spoofing is actually a common tactic used in both virus hoaxes and spam. Email spoofing involves disguising the sender's email address to make it appear as if it is coming from a different source.

This can be done to trick recipients into opening an email or clicking on a link, leading them to unknowingly download a virus or malicious software. In the case of virus hoaxes, email spoofing may be used to give the impression that the email is coming from a trusted source, such as a well-known company or government agency. The email may contain false information about a supposed virus outbreak or security threat, prompting the recipient to take action, such as forwarding the email to others or downloading a supposed "antivirus" software. Similarly, email spoofing is also commonly used in spam emails, where the sender may pose as a reputable company or individual in an attempt to gain the recipient's trust and persuade them to click on a link or download an attachment.
Overall, email spoofing is a deceptive tactic that can be used for a variety of malicious purposes, including virus hoaxes and spam. It is important for individuals to be cautious and verify the authenticity of emails before taking any action.

Learn more about virus here

https://brainly.com/question/25236237

#SPJ11

"this application failed to start because no qt platform plugin could be initialized" how to solve?

Answers

The "Windows could not find or load the Qt platform plugin, which resulted in this programme failing to start" error frequently happens after applying a number of Windows updates.

How can I fix an application that wouldn't launch on the Qt platform?

Due to an inability to initialise any Qt platform plugins, this application could not run. This issue might be resolved by reinstalling the programme.

What is the path for a Qt plugin?

Use QCore Application :: set LibraryPaths if you want to set your own path or paths (). Alternately, you can change the hard-coded paths that are built into the Qt library using a qt. conf file. See Using qt for more details.

To know more about programme visit:-

https://brainly.com/question/29835824

#SPJ4

jennifer decided that the licensing cost for a piece of video editing software was too expensive. instead, she decided to download a keygen program to generate a license key and install a pirated version of the editing software. after she runs the keygen, a license key is created, but her system performance becomes very sluggish, and her antimalware suite begins to display numerous alerts. which type of malware might her computer be infected with?

Answers

Her antimalware suite starts to display frequent warnings that her computer may be infected with Trojan as system performance gets extremely sluggish.

Which of the following password policies establishes the maximum number of past passwords a person can use before having their password reset?

The number of new, distinct passwords that must be linked to a user account before an old password can be used again is set by the Enforce password history policy setting.

What is the Windows Server 2008 domains' default password policy?

Users must change their passwords in a Windows Server 2008 R2 domain every 42 days by default. Passwords must be at least seven characters long, meet complexity standards, and use three of four character types: uppercase, lowercase, and special characters.

To know more about Trojan visit:-

https://brainly.com/question/9171237

#SPJ4

How to fix "files required to play gta online could not be downloaded"?

Answers

The way to fix "files required to play GTA online could not be downloaded" are given below.

What is the GTA Gaming  about?

Here are a few steps that you can try to fix the "files required to play GTA Online could not be downloaded" error:

Check your internet connection: Make sure that you have a stable internet connection and that you are not experiencing any connectivity issues.Restart the game: Close the game, and then reopen it to see if the error persists.Clear the game's cache: Go to the in-game settings and clear the game's cache. This can help to resolve any issues with corrupted or outdated files.Verify the game files: Use the game's built-in file verification feature to ensure that all of the game files are present and not corrupted.Update the game: Make sure that you are running the latest version of the game, and that all updates have been installed.Reinstall the game: If none of the above steps work, you may need to uninstall and reinstall the game.

Contact Rockstar Games Support: If you still have the issue, you can contact the Rockstar Games support team for further assistance. They may have a solution or a fix for the problem.

Therefore, it is vital to note that some of these steps may require a certain level of technical knowledge and experience. It's also important to keep in mind that the issue may not be related to the game or the user's device, but rather with the Rockstar Games

Learn more about Gaming from

https://brainly.com/question/28031867

#SPJ1

A friend wants to build a database of her music collection. What suggestions can you make to help her as she gets started? Select all that apply.

A. She should use a logical, organized naming structure for her music.

B. She must learn SQL to query the database.

C. She should save her most common queries to save time later.

D. She should create separate database files to hold information about her CDs and MP3 files.

Answers

Answer:

A & C

Explanation:

15 POINTS FOR THE ANSWERS ASAP
Which type of portfolio would you prefer to have? Why did you pick that portfolio?

Answers

Answer:

Aggressive Portfolio

Explanation:An aggressive portfolio takes on great risks in search of great returns.

For each obstacle, select the best solution.

1. failing to find other members for a club:

A. promoting the club to people you know at school and online
B. performing club activities alone until other people ask about it
C. asking other people for recipe ideas

2. failing a class:

A. retaking the class, and getting study help
B. getting an apprenticeship
C. skipping the class, and applying to culinary school

3. failing to get the credits necessary to graduate from high school:

A. planning a trip to explore food and restaurants in another country
B. reading books about cooking, and writing reviews of them
C. taking or retaking any needed classes

4. not having enough money to pay for culinary school:

A. performing volunteer work
B. applying for a student loan
C. applying for an apprenticeship

5. not getting a job or promotion:

A. taking a vacation, then working fewer hours
B. telling coworkers about your job frustration
C. building experience, then applying for another job

Answers

The answers to all of the obstacles are:

A. promoting the club to people you know at school and onlineA. retaking the class, and getting study helpC. taking or retaking any needed classesB. applying for a student loanC. building experience, then applying for another job

What is an obstacle

An obstacle is something that stands in the way of achieving a goal or completing a task. It can be a physical or mental barrier, a problem, a challenge, or a difficulty that needs to be overcome.

Obstacles can come in many different forms and can arise in any aspect of life, from personal to professional. Overcoming obstacles often requires problem-solving skills, creativity, perseverance, and sometimes, seeking help or support from others.

Read more on obstacles here:https://brainly.com/question/27329666

#SPJ1

orphan record example?

Answers

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

what is storage unit in computer and five examples of storage units.

Answers

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

Radio stations broadcast signals on two different frequency bands. These are called_____ _____ and _____ ______.

Answers

Radios broadcast using AM (amplitude modulation) and FM (frequency modulation).

4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference

Answers

Answer:

A. interview

Explanation:

Comparing hash values can be used to assure that files retain _________ when they are moved from place to place and have not been altered or corrupted.
A. Integrity
B. Confidentiality
C. Availability
D. Nonrepudiation

Answers

Thus, hash values are an essential tool in ensuring the integrity of data. They allow for the verification of data integrity by comparing hash values before and after the transfer of files.

Comparing hash values can be used to assure that files retain integrity when they are moved from place to place and have not been altered or corrupted. Hash values are unique identifiers that are generated by a mathematical algorithm.

These identifiers are based on the contents of a file, and any change to the file will result in a different hash value. By comparing the hash value of a file before and after it is moved or transferred, one can ensure that the file has not been tampered with or corrupted during the process.Integrity is a critical aspect of data security. Without data integrity, files can be altered, deleted, or corrupted without detection, leading to significant consequences. Hash values are an essential tool in ensuring the integrity of data. They provide a way to verify that data has not been tampered with or altered, making them an important part of any security protocol.In conclusion, hash values are an essential tool in ensuring the integrity of data. They allow for the verification of data integrity by comparing hash values before and after the transfer of files. By doing so, one can be confident that the data has not been tampered with or corrupted during the transfer process.

Know more about the hash values

https://brainly.com/question/31114832

#SPJ11

Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
1. The output of print(x) is

2. The output of print(len(x)) is

3. The output of print(x[10]) is

4. The output of print(x[1]+x[3]) is

Answers

Answer:

Print(x) would be directly calling the x variable so it would print everything but the []Print(x[10]) is calling the number 10 which results in E2 + d= 2d

_____________ is the percentage of time the network is usable by users.

Answers

No, the percentage of time the network is usable by users is typically referred to as network availability or network uptime.

It represents the amount of time that a network is operational and accessible to users without experiencing significant disruptions or downtime. Network availability is often expressed as a percentage, indicating the portion of time that the network is usable out of the total time observed. It is an important metric in assessing the reliability and performance of a network infrastructure.

Learn more about usable here;

https://brainly.com/question/15700485

#SPJ11

Expressions provide an easy way to perform operations on data values to produce other data values. True False

Answers

Expressions provide an easy way to perform operations on data values to produce other data values, True.

What is an Expression?

An expression is a combination of one or more operands (Constant, Variable, Array element, Function), operators(Multiplication,Division, Subtraction etc) to be interpreted by a programming language following rules of precedence or association to produce other data values.

Three kinds of expressions includes:

An arithmetic expression

A character expression

A logical or relational expression

Therefore, it is true that Expressions provide an easy way to perform operations on data values to produce other data values.

Other Questions
How do you convert 0.916 (6 repeating) to a fraction? PLEASE HELP ME(b) When a computer systems RAM becomes full it can use virtual memory.Explain what happens if the computer does not have any virtual memory. Do you know what a caucus?. an rh-negative mother will need a special treatment if she gives birth to an rh-positive baby. the treatment involves the destruction of any stray blood cells from the baby that might accidently pass into the mother's bloodstream. why is this necessary? . What city in Russia used to be known as Leningrad? Stalingrad? Which sentence is the clearest example of deductive reasoning?A. Bumblebees are disappearing. Therefore, bumblebee populationswill recover.B. The snake keeps escaping its pen. Therefore, it will continue toescape its pen.C. Planets are round. My basketball is round. Therefore, mybasketball is a planet.O D. Moons orbit planets. Europa is a moon. Therefore, Europa orbits aplanet it is often believed that a healthy heart can lead to healthy brains. Explain A certain brand of electric bulbs has an average life of 300 hours with a standard deviation of 25. A random sample of 100 bulbs is tested. What is the probability that the sample mean will be less than 295? 3. If in an experimental reaction, 32.5 mL were collected of hydrogen gas at 23.5 degrees Celsius and 745.2 torr, what would be the volume corrected to STP conditions A dog slept from 11:53 PM to 3:19 AM.How long did the dog sleep?plz help its a test thx! :) How "democratic" is the U.S. democracy? Long answer please 31. The family of this child is working with a geneticist to determine what condition the child has. The geneticist determined that the child has the karyotype shown below.Which of the following would be the most likely diagnosis for the child?A. This child is a female with Down syndrome.B. This child is a female with Turner syndrome.C. This child is a male with Turner syndrome.D. This child is a male with Down syndrome. Which of the following assessment descriptions represents an s/z ratio that is indicative of a vocal pathology? A.1.0. B.1.1. C.1.3. D.1.5. rearmament; pacifism. Write these 2 words in a sentence A figure is shown with the given dimensions.What is the area, in square feet, of the figure? Don't stress too much on those assignments! Drink some water and take a break and I hope you pass your year and get good grades! :) Here's a photo of a kitty if your feeling down. help please!!!what goes in the y for the output? 2. Given the following information, Total Investment $2,000 on Bond B Bond B Return $6,000 on Stock A Economy State Probability Good Normal Bad Stock A Return 0.4 0.4 0.2 15% 10% 3% 4% 600 8% a) Calculate the correlation coefficient between stock A and Bond B. b) Calculate the expected return and standard deviation of the portfolio, using BOTH scenario analysis method (calculate portfolio's return in each state and then follow the definition of E(r) and standard deviation, same as in the Excel homework) and the portfolio theory formula given bellow (the easier method, utilizing E(r) and std. of A and B and the correlation coefficient between A and B). c) Now, instead of $6,000 on stock A and $2,000 on bond B, investor needs a portfolio expected return 9% from the entire $8,000 investments. How should the investor allocate the fund between stock A and bond b? How do you find a missing third side of a triangle? Bug WatcherMike had all the right tools for his job: the high-powered binoculars, the tripod with feet that bent in multiple directions so he could set it on rough terrain and the best darned camera available on the market, with zoom lenses that could make a fly 100 feet away look huge. Not to mention the clothesmicrofiber, breathable, comfortable, unscratchable by any branches known to man, and mudproof to boot. Oh, and he had good boots toodurable ones. So, when he caught sight of the most glorious luna moth any bug scientist could ever hope to spot, he was ready to shoot.The camera's shutter clicked 20 times before that luna moth had a chance to flap its front wing. This way, Mike made sure he had the kind of shot that his magazine employers would want. Then, as the moth hopped from one leaf to another, he used his rapid-fire shutter gizmo to catch it in motion another 20 times or so.But Mike could see something odd about this new leaf the moth had chosen. It had bumps on it he didn't usually see on that kind of leaf. And the moth started touching one of its feelers to different bumps in a weird way. It looked as if it were typing notes onto thebumps! Kind of a one-feeler-tip typing system, but it was pretty fast. And, between spurts of tapping the bumps, the moth looked right at Mike. Mike knew that a bug like this couldn't really see him. It couldn't make sense of a shape like he or his camera and tripod would form. But he felt that the luna moth was studying him, as if it were a people scientist.He missed a few shots as he paused in amazement at this idea. Then he remembered to catch the glorious moth as it moved. Maybe when he developed them, the photographs would help him decide if he was going crazy and imagining things.They didn't really. They showed the image of a luna moth twitching its feeler on the leaf. You couldn't tell why it might have been doing that. But, what if those odd bumps on that leaf really could tell some kind of story about him or about whatever that moth could see in his direction?1Select the correct answer.Here is a question from the text aids: Does Mike take good pictures of the luna moth?A. No. The equipment is not good enough to photograph it.B. Probably, but his fancy equipment doesn't work very well that day.C. Probably, but he gets distracted by something he sees while he shoots it.