Last visit was: 17 May 2024, 21:03 It is currently 17 May 2024, 21:03
Toolkit
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Request Expert Reply

# A new security software authenticates a person by scanning the person

SORT BY:
Tags:
Show Tags
Hide Tags
Math Expert
Joined: 02 Sep 2009
Posts: 93334
Own Kudos [?]: 624554 [5]
Given Kudos: 81898
Intern
Joined: 14 Aug 2022
Posts: 23
Own Kudos [?]: 11 [1]
Given Kudos: 5
Intern
Joined: 14 Oct 2022
Posts: 18
Own Kudos [?]: 8 [1]
Given Kudos: 35
Location: India
Manager
Joined: 31 May 2015
Posts: 216
Own Kudos [?]: 181 [0]
Given Kudos: 219
Location: Fiji
Schools: IE
GPA: 1
Re: A new security software authenticates a person by scanning the person [#permalink]
I believe ans. B focuses on the issue at hand which is finger-prints.
Intern
Joined: 30 Nov 2021
Posts: 11
Own Kudos [?]: 2 [0]
Given Kudos: 71
A new security software authenticates a person by scanning the person [#permalink]
Can you explain these Evaluate question, and also please help in solving in evalute type questions, seems I usually get them wrong,
thanks
MartyMurray KarishmaB
Tutor
Joined: 16 Oct 2010
Posts: 14891
Own Kudos [?]: 65336 [0]
Given Kudos: 431
Location: Pune, India
Re: A new security software authenticates a person by scanning the person [#permalink]
Expert Reply
Bshubham512 wrote:
Can you explain these Evaluate question, and also please help in solving in evalute type questions, seems I usually get them wrong,
thanks
MartyMurray KarishmaB

­I have a video on how to handle Evaluate questions on my YouTube channel. Here is the link:
https://youtu.be/1JtHjH1lWZc
Tutor
Joined: 16 Oct 2010
Posts: 14891
Own Kudos [?]: 65336 [1]
Given Kudos: 431
Location: Pune, India
Re: A new security software authenticates a person by scanning the person [#permalink]
1
Kudos
Expert Reply
Bunuel wrote:
A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, which even leads to a loss of fingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.

Which of the following would be most helpful to evaluate the argument?

A. Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints

B. Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feet

C. Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition software

D. Whether the software can be hacked by replicating features such as temperature and curvature of the hand

E. Whether the software alternatively uses foot prints to authenticate people

­
Conclusion: It is likely that the security system does not use the finger-prints of a person as a metric for authentication.

This is what we have to evaluate - does the system use finger prints or not.

A. Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints

Whether other information is used or not, doesn't tell us whether fingerprints are used or not. Let's answer this question in 2 different ways:

Yes - Say length, width and thickness of the hands are used. Ok. What about fingerprints? Are they also used?
No - Say length, width and thickness of the hands are not used. Ok. What about fingerprints? Are they used?

Whether these other features mentioned are used or not does not tell us whether fingerprints are used or not.

B. Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feet

Yes, we should find out whether their hands had actually peeled or not yet - whether they still had their finger prints or not.
If they did still have fingerprints, then we cannot conclude whether fingerprints are used for authentication or not.
If they do not have fingerprints now, then we can say that fingerprints are not used for authentication.

Hence answer to this question impacts our conclusion.

Answer (B)

Re: A new security software authenticates a person by scanning the person [#permalink]
Moderators:
GMAT Club Verbal Expert
6929 posts
GMAT Club Verbal Expert
238 posts
CR Forum Moderator
832 posts