- Mon May 02, 2016 11:07 am
#23739
Complete Question Explanation
Flaw in the Reasoning. The correct answer choice is (D)
The stimulus observes that there are currently difficulties with computer security, and concludes that a voice-recognition system would be a way of giving access to authorized users without giving access to others, because in trials the such systems never incorrectly accept someone.
The reasoning is flawed because the conclusion implies that the system is a good way of granting access, but the conclusion considers only evidence about denying access. The system could be very good at denying access at the expense of efficient use by authorized users.
You may have also realized that it might be possible to circumvent the system with sound recordings. In that sense, this stimulus presents very much the same situation as did the six-pack wrapping argument (wildlife suffocation) that you no doubt remember. There are many technical critiques you can make relevant to the particular situation, but the inherent flaw is what you should probably focus on. Computer security is a two-part problem (at least), and the parts to consider are access and denial. The stimulus concerns information about only denial, and makes a conclusion about the whole problem of computer security, and that is a standard flaw. Since you are asked to identify the flaw, you should focus on that.
Answer choice (A): The fault in the argument was one of incomplete evidence, not one of an improper analogy. Possibly there are serious differences between voice-recognition and keyboard entered passwords; however, the argument made no comparison-- it drew a contrast in one area. This choice is wrong.
Answer choice (B): It is unclear what kind of data the argument utilizes, so you should not assume that the argument has over-generalized. This choice is wrong.
Answer choice (C): It is not a failure to stay on topic, so the fact that this argument does not consider the other applications of voice recognition is irrelevant, and this choice is incorrect.
Answer choice (D): This is the correct answer choice. There are two parts to the problem of computer security: access and denial. The argument fails to consider the problem of access, even though the argument draws a conclusion about access, and this choice correctly points out that the argument ignores the possibility that the program denies access to authorized users.
Answer choice (E): You may have wanted to select this choice, because you have learned that a qualified conclusion is a weakness. However, the truth is that qualification is not inherently flawed, and done correctly is not a weakness and is actually a means of improving an argument, because it is a means of taking more factors into account. An argument cannot be flawed merely because it is "heavily qualified."
Flaw in the Reasoning. The correct answer choice is (D)
The stimulus observes that there are currently difficulties with computer security, and concludes that a voice-recognition system would be a way of giving access to authorized users without giving access to others, because in trials the such systems never incorrectly accept someone.
The reasoning is flawed because the conclusion implies that the system is a good way of granting access, but the conclusion considers only evidence about denying access. The system could be very good at denying access at the expense of efficient use by authorized users.
You may have also realized that it might be possible to circumvent the system with sound recordings. In that sense, this stimulus presents very much the same situation as did the six-pack wrapping argument (wildlife suffocation) that you no doubt remember. There are many technical critiques you can make relevant to the particular situation, but the inherent flaw is what you should probably focus on. Computer security is a two-part problem (at least), and the parts to consider are access and denial. The stimulus concerns information about only denial, and makes a conclusion about the whole problem of computer security, and that is a standard flaw. Since you are asked to identify the flaw, you should focus on that.
Answer choice (A): The fault in the argument was one of incomplete evidence, not one of an improper analogy. Possibly there are serious differences between voice-recognition and keyboard entered passwords; however, the argument made no comparison-- it drew a contrast in one area. This choice is wrong.
Answer choice (B): It is unclear what kind of data the argument utilizes, so you should not assume that the argument has over-generalized. This choice is wrong.
Answer choice (C): It is not a failure to stay on topic, so the fact that this argument does not consider the other applications of voice recognition is irrelevant, and this choice is incorrect.
Answer choice (D): This is the correct answer choice. There are two parts to the problem of computer security: access and denial. The argument fails to consider the problem of access, even though the argument draws a conclusion about access, and this choice correctly points out that the argument ignores the possibility that the program denies access to authorized users.
Answer choice (E): You may have wanted to select this choice, because you have learned that a qualified conclusion is a weakness. However, the truth is that qualification is not inherently flawed, and done correctly is not a weakness and is actually a means of improving an argument, because it is a means of taking more factors into account. An argument cannot be flawed merely because it is "heavily qualified."