Check GMAT Club Decision Tracker for the Latest School Decision Releases https://gmatclub.com/AppTrack

It is currently 30 May 2017, 03:32

Close

GMAT Club Daily Prep

Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History

Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.

Close

Request Expert Reply

Confirm Cancel

Events & Promotions

Events & Promotions in June
Open Detailed Calendar

Yolanda: Gaining access to computers without authorization

  new topic post reply Question banks Downloads My Bookmarks Reviews Important topics  
Author Message
Senior Manager
Senior Manager
User avatar
Joined: 21 Mar 2004
Posts: 445
Location: Cary,NC
Followers: 3

Kudos [?]: 72 [0], given: 0

Yolanda: Gaining access to computers without authorization [#permalink]

Show Tags

New post 21 Jul 2004, 17:36
00:00
A
B
C
D
E

Difficulty:

(N/A)

Question Stats:

0% (00:00) correct 0% (00:00) wrong based on 0 sessions

HideShow timer Statistics

Yolanda: Gaining access to computers without
authorization and manipulating the data and
programs they contain is comparable to joyriding
in stolen cars; both involve breaking into private
property and treating it recklessly. Joyriding,
however, is the more dangerous crime because it
physically endangers people, whereas only
intellectual property is harmed in the case of
computer crimes.

Arjun: I disagree! For example, unauthorized use of
medical records systems in hospitals could
damage data systems on which human lives
depend, and therefore computer crimes also
cause physical harm to people.

The reasoning in Arjun’s response is flawed because he
(A) fails to maintain a distinction made in Yolanda’s argument
(B) denies Yolanda’s conclusion without providing evidence against it
(C) relies on the actuality of a phenomenon that he has only shown to be possible
(D) mistakes something that leads to his conclusion for something that is necessary for his conclusion
(E) uses as evidence a phenomenon that is inconsistent with his own conclusion
_________________

ash
________________________
I'm crossing the bridge.........

Senior Manager
Senior Manager
User avatar
Affiliations: CFA Level 2
Joined: 05 May 2004
Posts: 265
Location: Hanoi
Followers: 1

Kudos [?]: 115 [0], given: 0

 [#permalink]

Show Tags

New post 21 Jul 2004, 19:47
1 min & A. Arjun failed to maintain the distinction between intellectual & physical harms stated in Yolanda's argument.
_________________

"Life is like a box of chocolates, you never know what you'r gonna get"

Senior Manager
Senior Manager
User avatar
Joined: 21 Mar 2004
Posts: 445
Location: Cary,NC
Followers: 3

Kudos [?]: 72 [0], given: 0

 [#permalink]

Show Tags

New post 21 Jul 2004, 23:38
Wrong :!:

my ans was A too.

try again :)
_________________

ash
________________________
I'm crossing the bridge.........

Manager
Manager
User avatar
Joined: 20 Jun 2004
Posts: 170
Location: Noida, UP
Followers: 2

Kudos [?]: 29 [0], given: 0

 [#permalink]

Show Tags

New post 21 Jul 2004, 23:57
2 min, 5 sec..... C :)
_________________

--

./abisurd
Not absurd :)

Manager
Manager
avatar
Joined: 02 Jul 2004
Posts: 218
Followers: 1

Kudos [?]: 9 [0], given: 0

 [#permalink]

Show Tags

New post 22 Jul 2004, 02:13
C

quote Arjan "For example, unauthorized use of
medical records systems in hospitals COULD
damage data systems on which human lives
depend, and therefore computer crimes also
CAUSE physical harm to people"

Arjan fails to prove that this possibility is a regularity. If fact he says "computer crimes COULD cause harm, therefore they DO CAUSE harm"
Senior Manager
Senior Manager
avatar
Joined: 26 Jan 2004
Posts: 402
Location: India
Followers: 1

Kudos [?]: 1 [0], given: 0

 [#permalink]

Show Tags

New post 22 Jul 2004, 02:25
Will go for (C).

(Initally selected (A), but then had to re-analyze the question!!! :oops: )
Director
Director
User avatar
Joined: 01 Feb 2003
Posts: 846
Location: Hyderabad
Followers: 4

Kudos [?]: 109 [0], given: 0

 [#permalink]

Show Tags

New post 22 Jul 2004, 13:36
C is my FA

Concur with OlegC's explanation
Senior Manager
Senior Manager
User avatar
Joined: 01 May 2004
Posts: 336
Location: USA
Followers: 3

Kudos [?]: 108 [0], given: 0

 [#permalink]

Show Tags

New post 22 Jul 2004, 18:57
My answer is C as well (less than 1 min)
  [#permalink] 22 Jul 2004, 18:57
    Similar topics Author Replies Last post
Similar
Topics:
According to the Tristate Transportation Authority, making 12bhang 0 07 Aug 2013, 10:49
According to the Tristate Transportation Authority nikhil.jones.s 0 10 Jul 2013, 04:15
1 Yolanda: Gaining access to computers without authorization durgesh79 24 06 Jul 2008, 19:15
The authors of a recent article examined warnings of an eyunni 9 15 Nov 2007, 12:56
A private bus company gained greater profits and provided sidbidus 3 01 Jul 2007, 08:46
Display posts from previous: Sort by

Yolanda: Gaining access to computers without authorization

  new topic post reply Question banks Downloads My Bookmarks Reviews Important topics  


GMAT Club MBA Forum Home| About| Terms and Conditions| GMAT Club Rules| Contact| Sitemap

Powered by phpBB © phpBB Group and phpBB SEO

Kindly note that the GMAT® test is a registered trademark of the Graduate Management Admission Council®, and this site has neither been reviewed nor endorsed by GMAC®.