Bunuel wrote:
A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, which even leads to a loss of fingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.
Which of the following would be most helpful to evaluate the argument?
A. Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints
B. Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feet
C. Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition software
D. Whether the software can be hacked by replicating features such as temperature and curvature of the hand
E. Whether the software alternatively uses foot prints to authenticate people
My take:
Q. analysis:
A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system.
General information,It matches hand(real) = hand(system) :It could be using finger prints,length/structure,identification marks etc. Premise: However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, which even leads to a loss of fingerprints.
Now we are narrowing down to finger prints,software recognizes your hand even if your finger prints are gone. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.
Conclusion: Finger prints are not used because it worked on people suffering from chemotherapy-induced acral erythemaAssumption: target people(in recent laboratory tests on SW) lost there finger prints now we need to find a choice which talks about assumption
lets analyze the choices given:
A. Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints
Here,even if software is checking for correlation between other information it doesn't mean finger print is not used. B.
Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetIf the information is true then it weakens the conclusion and if it is false then it supports the conclusionC. Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition software
It doesn't help in evaluating because we are concern about finger prints ,not concerned about other security software D. Whether the software can be hacked by replicating features such as temperature and curvature of the hand
Out of scopeE. Whether the software alternatively uses foot prints to authenticate people
neither Premise nor conclusion talks about food prints