A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, which even leads to a loss of fingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.
Which of the following would be most helpful to evaluate the argument?
A. Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints
B. Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feet
C. Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition software
D. Whether the software can be hacked by replicating features such as temperature and curvature of the hand
E. Whether the software alternatively uses foot prints to authenticate people