Find all School-related info fast with the new School-Specific MBA Forum

It is currently 22 Oct 2014, 06:41

Close

GMAT Club Daily Prep

Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History

Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.

Events & Promotions

Events & Promotions in June
Open Detailed Calendar

Yolanda: Gaining access to computers without authorization

  Question banks Downloads My Bookmarks Reviews Important topics  
Author Message
TAGS:
Senior Manager
Senior Manager
User avatar
Joined: 21 Mar 2004
Posts: 445
Location: Cary,NC
Followers: 2

Kudos [?]: 9 [0], given: 0

Yolanda: Gaining access to computers without authorization [#permalink] New post 21 Jul 2004, 16:36
00:00
A
B
C
D
E

Difficulty:

(N/A)

Question Stats:

0% (00:00) correct 0% (00:00) wrong based on 0 sessions
Yolanda: Gaining access to computers without
authorization and manipulating the data and
programs they contain is comparable to joyriding
in stolen cars; both involve breaking into private
property and treating it recklessly. Joyriding,
however, is the more dangerous crime because it
physically endangers people, whereas only
intellectual property is harmed in the case of
computer crimes.

Arjun: I disagree! For example, unauthorized use of
medical records systems in hospitals could
damage data systems on which human lives
depend, and therefore computer crimes also
cause physical harm to people.

The reasoning in Arjun’s response is flawed because he
(A) fails to maintain a distinction made in Yolanda’s argument
(B) denies Yolanda’s conclusion without providing evidence against it
(C) relies on the actuality of a phenomenon that he has only shown to be possible
(D) mistakes something that leads to his conclusion for something that is necessary for his conclusion
(E) uses as evidence a phenomenon that is inconsistent with his own conclusion
_________________

ash
________________________
I'm crossing the bridge.........

Senior Manager
Senior Manager
User avatar
Affiliations: CFA Level 2
Joined: 05 May 2004
Posts: 267
Location: Hanoi
Followers: 1

Kudos [?]: 7 [0], given: 0

 [#permalink] New post 21 Jul 2004, 18:47
1 min & A. Arjun failed to maintain the distinction between intellectual & physical harms stated in Yolanda's argument.
_________________

"Life is like a box of chocolates, you never know what you'r gonna get"

Senior Manager
Senior Manager
User avatar
Joined: 21 Mar 2004
Posts: 445
Location: Cary,NC
Followers: 2

Kudos [?]: 9 [0], given: 0

 [#permalink] New post 21 Jul 2004, 22:38
Wrong :!:

my ans was A too.

try again :)
_________________

ash
________________________
I'm crossing the bridge.........

Manager
Manager
User avatar
Joined: 20 Jun 2004
Posts: 169
Location: Noida, UP
Followers: 1

Kudos [?]: 24 [0], given: 0

 [#permalink] New post 21 Jul 2004, 22:57
2 min, 5 sec..... C :)
_________________

--

./abisurd
Not absurd :)

Manager
Manager
avatar
Joined: 02 Jul 2004
Posts: 218
Followers: 1

Kudos [?]: 1 [0], given: 0

 [#permalink] New post 22 Jul 2004, 01:13
C

quote Arjan "For example, unauthorized use of
medical records systems in hospitals COULD
damage data systems on which human lives
depend, and therefore computer crimes also
CAUSE physical harm to people"

Arjan fails to prove that this possibility is a regularity. If fact he says "computer crimes COULD cause harm, therefore they DO CAUSE harm"
Senior Manager
Senior Manager
avatar
Joined: 26 Jan 2004
Posts: 402
Location: India
Followers: 1

Kudos [?]: 0 [0], given: 0

 [#permalink] New post 22 Jul 2004, 01:25
Will go for (C).

(Initally selected (A), but then had to re-analyze the question!!! :oops: )
Director
Director
User avatar
Joined: 01 Feb 2003
Posts: 854
Location: Hyderabad
Followers: 1

Kudos [?]: 20 [0], given: 0

 [#permalink] New post 22 Jul 2004, 12:36
C is my FA

Concur with OlegC's explanation
Senior Manager
Senior Manager
User avatar
Joined: 01 May 2004
Posts: 336
Location: USA
Followers: 1

Kudos [?]: 4 [0], given: 0

 [#permalink] New post 22 Jul 2004, 17:57
My answer is C as well (less than 1 min)
  [#permalink] 22 Jul 2004, 17:57
    Similar topics Author Replies Last post
Similar
Topics:
1 Experts publish their posts in the topic Can iPod Touch access GMAT Club app without wifi access ? AbhiJ 4 04 Jun 2012, 03:19
GMAT self-learning without internet access naychi 12 09 Jun 2010, 23:34
5 Experts publish their posts in the topic The ability to access information via computer is a chandru42 26 29 Sep 2009, 06:00
computer ritula 4 07 Feb 2009, 02:41
1 Yolanda: Gaining access to computers without authorization durgesh79 24 03 Jul 2008, 09:10
Display posts from previous: Sort by

Yolanda: Gaining access to computers without authorization

  Question banks Downloads My Bookmarks Reviews Important topics  


GMAT Club MBA Forum Home| About| Privacy Policy| Terms and Conditions| GMAT Club Rules| Contact| Sitemap

Powered by phpBB © phpBB Group and phpBB SEO

Kindly note that the GMAT® test is a registered trademark of the Graduate Management Admission Council®, and this site has neither been reviewed nor endorsed by GMAC®.