It is currently 23 Sep 2017, 09:43

# Happening Now:

Alleviate MBA app anxiety! Come to Chat Room #2

### GMAT Club Daily Prep

#### Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History

# Events & Promotions

###### Events & Promotions in June
Open Detailed Calendar

# A standard problem for computer security is that passwords

Author Message
TAGS:

### Hide Tags

Manager
Joined: 10 Dec 2005
Posts: 95

Kudos [?]: 82 [0], given: 0

### Show Tags

20 Dec 2005, 06:40
00:00

Difficulty:

(N/A)

Question Stats:

100% (00:00) correct 0% (00:00) wrong based on 6 sessions

### HideShow timer Statistics

A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computerâ€™s data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.

The reasoning above is flawed because it
(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access
(E) states its conclusion in a heavily qualified way

Can you pls explain ur thinking? Thanks.
_________________

JAI HIND!

Kudos [?]: 82 [0], given: 0

Director
Joined: 14 Sep 2005
Posts: 984

Kudos [?]: 209 [0], given: 0

Location: South Korea

### Show Tags

20 Dec 2005, 06:48
A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computerâ€™s data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.

The reasoning above is flawed because it

(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard

>> You can never steal or guess someone else's voice. Thus the comparison is not faulty. (Incorrect)

(B) bases a general conclusion on a small amount of data

>> It is true that the conclusion of the stem is based on a small initial trial, but the stem does not draw its conclusion directly from the initial trial. Its conclusion is effective, as is already shown in the stem, under a certain condition - "if the same result can be repeated in operational settings". (Incorrect)

(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security

>> What's wrong with easily having applications? This seems out of scope. (Incorrect)

(D) ignores the possibility that the system sometimes denies access to people who are entitled to access

>> I guess this is the best answer. Even though it is true that the voice security system can dispel unauthorized access, it would not be useful if it sometimes denies access to authorized people. (Correct)

(E) states its conclusion in a heavily qualified way

>> It does not. (Incorrect)
_________________

Auge um Auge, Zahn um Zahn !

Kudos [?]: 209 [0], given: 0

Manager
Joined: 10 Dec 2005
Posts: 95

Kudos [?]: 82 [0], given: 0

### Show Tags

20 Dec 2005, 07:23
Thanks for your explanation! I chose answer A as i thought voice and passwords being two separare processes, comparison is not accurate.
But now D seems more proper.
_________________

JAI HIND!

Kudos [?]: 82 [0], given: 0

SVP
Joined: 16 Oct 2003
Posts: 1800

Kudos [?]: 170 [0], given: 0

### Show Tags

20 Dec 2005, 16:00
So is D the OA?

Kudos [?]: 170 [0], given: 0

Manager
Joined: 10 Dec 2005
Posts: 95

Kudos [?]: 82 [0], given: 0

### Show Tags

20 Dec 2005, 16:52
Yup..OA is D!
_________________

JAI HIND!

Kudos [?]: 82 [0], given: 0

Intern
Joined: 12 Jul 2012
Posts: 10

Kudos [?]: [0], given: 0

### Show Tags

13 Jul 2012, 22:10

In the conclusion it states "...then there will be a way of giving access to those peole who are entitled to access and to no one else."

It never says that it can properly give access to those it's intended for.

Dude, these questions suck. For example, this problem. Therefore, they should not put problems like this on exams.

Kudos [?]: [0], given: 0

Re: A standard problem for computer security is that passwords   [#permalink] 13 Jul 2012, 22:10
Similar topics Replies Last post
Similar
Topics:
computer program 8 09 Sep 2013, 16:58
2 In a suburban community in the Southeast, neighborhood security 2 10 May 2017, 00:27
Computers have solved many problems for us, but they create some 1 10 Aug 2017, 05:54
2 The standard computer keyboard, called QWERTY because of the arrangeme 6 16 Jul 2017, 04:20
Display posts from previous: Sort by