Last visit was: 18 Nov 2025, 17:35 It is currently 18 Nov 2025, 17:35
Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
User avatar
Bunuel
User avatar
Math Expert
Joined: 02 Sep 2009
Last visit: 18 Nov 2025
Posts: 105,355
Own Kudos:
Given Kudos: 99,964
Products:
Expert
Expert reply
Active GMAT Club Expert! Tag them with @ followed by their username for a faster response.
Posts: 105,355
Kudos: 778,072
 [13]
1
Kudos
Add Kudos
12
Bookmarks
Bookmark this Post
User avatar
blowice27
Joined: 16 Apr 2019
Last visit: 29 Jun 2021
Posts: 200
Own Kudos:
333
 [3]
Given Kudos: 48
Location: India
Concentration: Marketing, Sustainability
GPA: 4
WE:Information Technology (Computer Software)
Products:
3
Kudos
Add Kudos
Bookmarks
Bookmark this Post
User avatar
bidskamikaze
Joined: 07 Jan 2018
Last visit: 29 Oct 2022
Posts: 261
Own Kudos:
295
 [1]
Given Kudos: 160
Location: India
GMAT 1: 710 Q49 V38
GMAT 1: 710 Q49 V38
Posts: 261
Kudos: 295
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
avatar
sthahvi
Joined: 30 Nov 2018
Last visit: 24 Jan 2022
Posts: 61
Own Kudos:
10
 [1]
Given Kudos: 194
Posts: 61
Kudos: 10
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
bidskamikaze
The OA seems confusing, as it doesn't address the core problem with keyboard passwords: That they are easy to steal or guess. Choice A seems to be a better choice.
Experts please help with this one!

I agree with this A does seem like a better option as well as applicable
avatar
anshulasthana
Joined: 26 Jan 2021
Last visit: 15 Jan 2022
Posts: 5
Own Kudos:
Given Kudos: 9
Posts: 5
Kudos: 1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Someone, please explain why A is wrong.
And how D is not vaguely assumed.

Is it talking about the scenario when an authorized person is suffering from a Cold?
User avatar
AnirudhaS
User avatar
LBS Moderator
Joined: 30 Oct 2019
Last visit: 25 Jun 2024
Posts: 811
Own Kudos:
872
 [1]
Given Kudos: 1,575
Posts: 811
Kudos: 872
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
anshulasthana
Someone, please explain why A is wrong.
And how D is not vaguely assumed.

Is it talking about the scenario when an authorized person is suffering from a Cold?
D is correct. Think in terms of Venn diagrams.

In the text this is mentioned
", the system never incorrectly accepted someone seeking access to the computer's data"

But this can mean two things -
(1) It stopped BAD guys (SUCCESS)
(2) It stopped GOOD guys (FAIL)

**here BAD = not a match, people not matching the password/description
**GOOD = a match, and has right of entry to the system

Situation (2) is exactly what D is -
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access

Hope this helps.
User avatar
HoneyLemon
User avatar
Stern School Moderator
Joined: 26 May 2020
Last visit: 02 Oct 2023
Posts: 628
Own Kudos:
Given Kudos: 219
Status:Spirited
Concentration: General Management, Technology
WE:Analyst (Computer Software)
Kudos
Add Kudos
Bookmarks
Bookmark this Post
I got confused between B and D .

But realized that key to read the highlighted portion ..

the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting
=> then there will be a way of giving access to those people who are entitled to access and to no one else.

To achieve the highlighted conclusion the assumption is the people who are entitled to get access are not stopped as well .



A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.

The reasoning above is flawed because it

(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access
(E) states its conclusion in a heavily qualified way
User avatar
8Harshitsharma
Joined: 25 Oct 2017
Last visit: 06 Jul 2025
Posts: 133
Own Kudos:
142
 [1]
Given Kudos: 723
GMAT Focus 1: 655 Q87 V80 DI80
GMAT 1: 690 Q49 V35
GRE 1: Q165 V160
GRE 2: Q170 V162
GPA: 9.25
GMAT Focus 1: 655 Q87 V80 DI80
GMAT 1: 690 Q49 V35
GRE 1: Q165 V160
GRE 2: Q170 V162
Posts: 133
Kudos: 142
 [1]
1
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Bunuel
A standard problem for computer security is that passwords that have to be typed on a computer keyboard are comparatively easy for unauthorized users to steal or guess. A new system that relies on recognizing the voices of authorized users apparently avoids this problem. In a small initial trial, the system never incorrectly accepted someone seeking access to the computer's data. Clearly, if this result can be repeated in an operational setting, then there will be a way of giving access to those people who are entitled to access and to no one else.

The reasoning above is flawed because it

(A) makes a faulty comparison, in that a security system based on voice recognition would not be expected to suffer from the same problems as one that relied on passwords entered from a keyboard
(B) bases a general conclusion on a small amount of data
(C) fails to recognize that a security system based on voice recognition could easily have applications other than computer security
(D) ignores the possibility that the system sometimes denies access to people who are entitled to access
(E) states its conclusion in a heavily qualified way
No proper explanation for answer choice A is provided, so I'll take a stab at it.

­Choice A

A is incorrect because the comparison is a totally valid comparison, keeping in context the given problem with keyboard system. It is NOT expected that the voice recognition system overcomes ALL the vulnerabilities in the world for password systems, especially since it is stated in the argument - "A new system that relies on recognizing the voices of authorized users apparently avoids this problem" - the problem being keyboard passwords are comparatively easy to steal or guess for unauthorized users. So the voice recognition system needs to avoid only this problem for the conclusion to hold - we don't care about any "other" problems the voice recognition system may have. Hence, this choice is an invalid claim.

Choice D

Clearly, it addresses the possibility of going against the conclusion by contradicting the bolded part - "...there will be a way of giving access to those people who are entitled to access and to no one else."

Hope this helps somebody.

 ­
User avatar
AbhishekP220108
Joined: 04 Aug 2024
Last visit: 18 Nov 2025
Posts: 169
Own Kudos:
Given Kudos: 81
GMAT Focus 1: 555 Q81 V78 DI74
Products:
GMAT Focus 1: 555 Q81 V78 DI74
Posts: 169
Kudos: 60
Kudos
Add Kudos
Bookmarks
Bookmark this Post
Can we have a official explanation for this one
Moderators:
GMAT Club Verbal Expert
7445 posts
GMAT Club Verbal Expert
234 posts
188 posts