Bunuel wrote:
A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.
The reasoning above is flawed because it
(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access
(E) states its conclusion in a heavily qualified way
No proper explanation for answer choice A is provided, so I'll take a stab at it.
Choice AA is incorrect because the comparison is a totally valid comparison, keeping in context the given problem with keyboard system. It is NOT expected that the voice recognition system overcomes ALL the vulnerabilities in the world for password systems, especially since it is stated in the argument - "A new system that relies on recognizing the voices of authorized users apparently avoids
this problem" - the problem being keyboard passwords are comparatively easy to steal or guess for unauthorized users. So the voice recognition system needs to avoid only this problem for the conclusion to hold - we don't care about any "other" problems the voice recognition system may have. Hence, this choice is an invalid claim.
Choice DClearly, it addresses the possibility of going against the conclusion by contradicting the bolded part - "...there will be
a way of giving access to those people who are entitled to access and to no one else."
Hope this helps somebody.