Last visit was: 24 Apr 2024, 15:33 It is currently 24 Apr 2024, 15:33

Close
GMAT Club Daily Prep
Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.

Customized
for You

we will pick new questions that match your level based on your Timer History

Track
Your Progress

every week, we’ll send you an estimated GMAT score based on your performance

Practice
Pays

we will pick new questions that match your level based on your Timer History
Not interested in getting valuable practice questions and articles delivered to your email? No problem, unsubscribe here.
Close
Request Expert Reply
Confirm Cancel
SORT BY:
Date
Tags:
Show Tags
Hide Tags
Math Expert
Joined: 02 Sep 2009
Posts: 92900
Own Kudos [?]: 618808 [5]
Given Kudos: 81588
Send PM
Manager
Manager
Joined: 21 Jan 2020
Posts: 53
Own Kudos [?]: 41 [0]
Given Kudos: 56
Send PM
Current Student
Joined: 26 Aug 2018
Posts: 35
Own Kudos [?]: 32 [0]
Given Kudos: 96
Location: India
Concentration: General Management, Technology
GMAT 1: 680 Q49 V33
Send PM
Current Student
Joined: 01 Sep 2019
Posts: 29
Own Kudos [?]: 9 [0]
Given Kudos: 44
Location: Viet Nam
GMAT 1: 660 Q49 V31
Send PM
Re: Yolanda: Gaining access to computers without authorization and manipul [#permalink]
Can any expert explain this problem? I think that Yolanda mentioned that "only intellectual property is harmed in the case of computer crimes" and Arjun took example for this case, not a disagreement
Manager
Manager
Joined: 12 Dec 2019
Posts: 120
Own Kudos [?]: 39 [0]
Given Kudos: 13
Location: India
Schools: LBS '24
GMAT 1: 690 Q50 V34
Send PM
Re: Yolanda: Gaining access to computers without authorization and manipul [#permalink]
Bunuel wrote:
Yolanda: Gaining access to computers without authorization and manipulating the data and programs they contain is comparable to joyriding in stolen cars; both involve breaking into private property and treating it recklessly. Joyriding, however, is the more dangerous crime because it physically endangers people, whereas only intellectual property is harmed in the case of computer crimes.

Arjun: I disagree! For example, unauthorized use of medical records systems in hospitals could damage data systems on which human lives depend, and therefore computer crimes also cause physical harm to people.

The reasoning in Arjun’s response is flawed because he


(A) fails to maintain a distinction made in Yolanda’s argument

(B) denies Yolanda’s conclusion without providing evidence against it

(C) relies on the actuality of a phenomenon that he has only shown to be possible

(D) mistakes something that leads to his conclusion for something that is necessary for his conclusion

(E) uses as evidence a phenomenon that is inconsistent with his own conclusion



Y says that Cyber crime and Car stealing are same. Except for one point.
Cyber Crime - IP is harmed
Car Stealing - Physical property is harmed

A says that Cyber crime is equally severe. And gives example in the form of hypothesis.

Y gives concrete example but A presents hypothesis.


A. Arjun is disagreeing to Y’s argument and thus his set of analogy can be different. But this does not explain why the reasoning is flawed.

B. Arjun provides the evidence by giving the example of Hospital data.

D. Arjun does not confuse ‘good to have’ with ‘must to have’

E. The only conclusion is ‘I disagree’ and Arjun’s presumes supports the conclusion.

C. Arjun introduces a hypothesis (probabilistic) to arrive at a (absolute / concrete) conclusion.

Hence C is the answer.

Posted from my mobile device
GMAT Club Legend
GMAT Club Legend
Joined: 03 Oct 2013
Affiliations: CrackVerbal
Posts: 4946
Own Kudos [?]: 7626 [1]
Given Kudos: 215
Location: India
Send PM
Re: Yolanda: Gaining access to computers without authorization and manipul [#permalink]
1
Kudos
Let us consider the answer options:

(A) fails to maintain a distinction made in Yolanda’s argument The distinction made in Yolanda's argument is that one crime causes physical harm (and the other presumably does not), making it more dangerous. Arjun states: "therefore computer crimes also cause physical harm to people". Therefore, he does acknowledge the distinction made by Yolanda - it is only that he believes that this distinction is not applicable to computer crimes. We cannot say for sure that he fails to maintain the distinction. Eliminate.

(B) denies Yolanda’s conclusion without providing evidence against it Arjun does provide an example (medical records) which contradicts Yolanda's line of reasoning with respect to computer crimes, which can be considered "evidence". Eliminate.

(C) relies on the actuality of a phenomenon that he has only shown to be possible Correct. Computer crimes may cause physical harm in the example provided by Arjun. However, this is only a possibility in Arjun's example (as evidence by the usage of the word "could"). Arjun's argument relies on this actually happening for his rebuttal to be valid.

(D) mistakes something that leads to his conclusion for something that is necessary for his conclusion The example provided by Arjun acts as a reason for his conclusion - there could be other such examples and hence this is not strictly necessary for his conclusion to be true. Eliminate.

(E) uses as evidence a phenomenon that is inconsistent with his own conclusion The evidence (example of medical records) is consistent with his conclusion. Eliminate.

Hope this helps.
GMAT Club Bot
Re: Yolanda: Gaining access to computers without authorization and manipul [#permalink]
Moderators:
GMAT Club Verbal Expert
6920 posts
GMAT Club Verbal Expert
238 posts
CR Forum Moderator
832 posts

Powered by phpBB © phpBB Group | Emoji artwork provided by EmojiOne