Check GMAT Club Decision Tracker for the Latest School Decision Releases https://gmatclub.com/AppTrack

 It is currently 23 May 2017, 18:54

### GMAT Club Daily Prep

#### Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History

# Events & Promotions

###### Events & Promotions in June
Open Detailed Calendar

Author Message
TAGS:

### Hide Tags

Senior Manager
Joined: 30 Aug 2003
Posts: 329
Location: BACARDIVILLE
Followers: 1

Kudos [?]: 21 [0], given: 0

### Show Tags

07 Dec 2003, 16:41
00:00

Difficulty:

(N/A)

Question Stats:

67% (01:39) correct 33% (01:35) wrong based on 2 sessions

### HideShow timer Statistics

authorization and manipulating the data and
programs they contain is comparable to joyriding
in stolen cars; both involve breaking into private
property and treating it recklessly. Joyriding,
however, is the more dangerous crime because it
physically endangers people, whereas only
intellectual property is harmed in the case of
computer crimes.
Arjun: I disagree! For example, unauthorized use of
medical records systems in hospitals could
damage data systems on which human lives
depend, and therefore computer crimes also
cause physical harm to people.

The reasoning in ArjunтАЩs response is flawed because he
(A) fails to maintain a distinction made in YolandaтАЩs
argument
(B) denies YolandaтАЩs conclusion without providing
evidence against it
(C) relies on the actuality of a phenomenon that he
has only shown to be possible
(D) mistakes something that leads to his conclusion
for something that is necessary for his
conclusion
(E) uses as evidence a phenomenon that is
inconsistent with his own conclusion

****Any ?
If you have any questions
New!
CEO
Joined: 15 Aug 2003
Posts: 3454
Followers: 67

Kudos [?]: 874 [0], given: 781

### Show Tags

07 Dec 2003, 19:35
sunniboy007 wrote:
authorization and manipulating the data and
programs they contain is comparable to joyriding
in stolen cars; both involve breaking into private
property and treating it recklessly. Joyriding,
however, is the more dangerous crime because it
physically endangers people, whereas only
intellectual property is harmed in the case of
computer crimes.

Arjun: I disagree! For example, unauthorized use of
medical records systems in hospitals could
damage data systems on which human lives
depend, and therefore computer crimes also
cause physical harm to people.

The reasoning in ArjunтАЩs response is flawed because he
(A) fails to maintain a distinction made in YolandaтАЩs
argument
(B) denies YolandaтАЩs conclusion without providing
evidence against it
(C) relies on the actuality of a phenomenon that he
has only shown to be possible
(D) mistakes something that leads to his conclusion
for something that is necessary for his
conclusion
(E) uses as evidence a phenomenon that is
inconsistent with his own conclusion

****Any ?

C

Arjun says unauthorized use of medical records "could" damage...and then goes on to say that computer crimes are harmful to people too.

That is, he does not provide too much evidence whether the event actually occurs. he simply bases his conclusion based on his perception.

thanks
praetorian
SVP
Joined: 03 Feb 2003
Posts: 1604
Followers: 9

Kudos [?]: 268 [0], given: 0

### Show Tags

09 Dec 2003, 04:59
Got C as well. A nice question. I am at the brink of an intellectual orgasm.
Manager
Joined: 22 Apr 2003
Posts: 177
Followers: 2

Kudos [?]: 45 [0], given: 0

### Show Tags

10 Dec 2003, 16:44
sunniboy007 wrote:
C) is correct

I also like D ....
Why is it wrong?
Director
Joined: 28 Oct 2003
Posts: 501
Location: 55405
Followers: 1

Kudos [?]: 25 [0], given: 0

### Show Tags

10 Dec 2003, 18:10
I am at the brink of an intellectual orgasm.

Heh.
Intern
Joined: 05 Aug 2014
Posts: 10
Followers: 0

Kudos [?]: 0 [0], given: 0

### Show Tags

14 Apr 2016, 04:39
Looking at it now, C makes sense here.
Similar topics Replies Last post
Similar
Topics:
Yolanda: Gaining access to computers without authorization and 1 25 Mar 2016, 08:49
According to the Tristate Transportation Authority 0 10 Jul 2013, 04:15
6 The ability to access information via computer is a 26 13 May 2014, 10:06
1 The author of a book tracing the relationship of 8 28 Jul 2016, 21:47
Display posts from previous: Sort by