| Critical Reasoning Butler: August 2025 |
| August 11 | CR 1 | CR 2 |
_________________________________
CR 1 Business manager: Our new product should be packaged with plastic shells manufactured using vacuum forming technologies, and not those of injection molding. The vacuum forming process requires the creation of molds that are far cheaper to manufacture than those needed for injection molding.
Engineer: The molds used in the injection molding process are forged from a beryllium-copper alloy which can withstand the cumulative damage caused by the production of 100 times more packaging shells than the materials used to make vacuum forming molds.
The engineer responds to the business manager by
A. forming an objection to the business manager's suggestion by emphasizing a flaw in the logic of that suggestion
B. highlighting an inherent flaw in the reasoning adopted by the business manager in order for the conclusion to have been formed
C. weakening the business manager's proposition with a concrete example that clearly contradicts the basis of that proposition
D. providing evidence that supports an objection to the business manager's claim by introducing a factor that indirectly undermines that claim
E. presenting data that is in complete opposition to that used by the business manager in support of the proposal
_________________________________
CR 2 Computer Crimes Detective: A suspect monitored by our team was witnessed logging into Website X. Soon thereafter, Website X crashed due to a Trojan virus attack, causing damages estimated at millions of dollars. The same suspect also logged into Website Y. An hour after the suspect signed out of Website Y, it was attacked by the same virus and, subsequently, crashed. This strongly suggests that the suspect is either a hacker who is using this virus to shut websites down, or an unwitting user infected with the virus.
A major flaw in the detective's argument above is that
(A) the detective overlooks the fact that during the second attack, the suspect had already been disconnected
(B) the detective ignores the possibility that two different people could have used the same computer
(C) the detective confuses the person who wrote the virus with the person who deployed it
(D) the detective connects the cases of Websites X and Y and supposes that a pattern exists
(E) the detective ignores the possibility that other people may have also been logged into the websites the same time that the suspect was