GMAT Exam  >  GMAT Questions  >  A new security software authenticates a perso... Start Learning for Free
A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, which even leads to a loss of fingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.
Which of the following would be most helpful to evaluate the argument?
  • a)
    Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints
  • b)
    Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feet
  • c)
    Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition software
  • d)
    Whether the software can be hacked by replicating features such as temperature and curvature of the hand
  • e)
    Whether the software alternatively uses foot prints to authenticate people
Correct answer is option 'B'. Can you explain this answer?
Verified Answer
A new security software authenticates a person by scanning the person&...
A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, which even leads to a loss of fingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.
Which of the following would be most helpful to evaluate the argument?
Argument Analysis
Pre-Thinking
Conclusion Clarification
N/A
Pre-Thinking Approach
In order to evaluate the argument, we’ll pre think assumptions and ask questions that can help us evaluate these assumptions. To do so, let’s see how we can falsify the conclusion.  Let’s look at the logical structure, focusing on linkage 1.  We will understand the conditions under which the conclusion is falsified.  The assumption then will be that these conditions don’t exist. 
Linkage#1
  • Falsification Condition:  What if the people who have started suffering recently from CIAE have not been fully affected yet? It could be that the pain and peeling is there but they haven’t lost finger prints yet.  If this were true, then the conclusion will be falsified.
    • Assumption: Even people who have recently been affected by CIAE have lost fingerprints.
Accordingly the correct choice could evaluate:
  • Instance: Whether people who have just started suffering from CIAE have lost their fingerprints.
With this understanding, let’s approach the answer choices. 
Answer Choices
A
Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and joints
Incorrect - Irrelevant
A yes or no answer to this question will not lead to any conclusive piece of information.
B
Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feet
Correct
This choice is written along the lines of our pre-thinking per Linkage #1. If they are at a stage at which the peeling of the skin is limited to the feet, then it reduces our belief in the conclusion that the SS doesn’t use fingerprints as a method of authentication. If they are not at a stage at which the peeling of the skin is limited to just the feet, then it’s possible that their fingerprints were affected and this fact increases our belief in the conclusion.
C
Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition software
Incorrect - Irrelevant
The likelihood of authentication by other software is completely irrelevant.
D
Whether the software can be hacked by replicating features such as temperature and curvature of the hand
Incorrect - Irrelevant
This option is not relevant as we don’t know if temperature and curvature of hand is even affected by CIAE.
E
Whether the software alternatively uses foot prints to authenticate people
Incorrect – Goes against a premise
We already know that SS scans a person’s hand for authentication. Therefore, it cannot use foot prints to match against a hand scan in order to authenticate people.
View all questions of this test
Explore Courses for GMAT exam

Similar GMAT Doubts

Directions: Read the Passage carefully and answer the question as follow.Archaeology as a profession faces two major prob-lems. First, it is the poorest of the poor. Only paltrysums are available for excavating and even less is avail-able for publishing the results and preserving the sites(5) once excavated. Yet archaeologists deal with pricelessobjects every day. Second, there is the problem of illegalexcavation, resulting in museum-quality pieces beingsold to the highest bidder.I would like to make an outrageous suggestion that(10) would at one stroke provide funds for archaeology andreduce the amount of illegal digging. I would proposethat scientific archeological expeditions and govern-mental authorities sell excavated artifacts on the openmarket. Such sales would provide substantial funds for(15) the excavation and preservation of archaeological sitesand the publication of results. At the same time, theywould break the illegal excavator’s grip on the market,thereby decreasing the inducement to engage in illegalactivities.(20) You might object that professionals excavate toacquire knowledge, not money. Moreover, ancient arti-facts are part of our global cultural heritage, whichshould be available for all to appreciate, not sold to thehighest bidder. I agree. Sell nothing that has unique(25) artistic merit or scientific value. But, you might reply,everything that comes our of the ground has scientificvalue. Here we part company. Theoretically, you may becorrect in claiming that every artifact has potential scien-tific value. Practically, you are wrong.(30)I refer to the thousands of pottery vessels and ancientlamps that are essentially duplicates of one another. Inone small excavation in Cyprus, archaeologists recentlyuncovered 2,000 virtually indistinguishable small jugs ina single courtyard, Even precious royal seal impressions(35) known as/melekh handles have been found in abun-dance---more than 4,000 examples so far.The basements of museums are simply not largeenough to store the artifacts that are likely to be discov-ered in the future. There is not enough money even to(40) catalogue the finds; as a result, they cannot be foundagain and become as inaccessible as if they had neverbeen discovered. Indeed, with the help of a computer,sold artifacts could be more accessible than are thepieces stored in bulging museum basements. Prior to(45) sale, each could be photographed and the list of thepurchasers could be maintained on the computer Apurchaser could even be required to agree to return thepiece if it should become needed for scientific purposes.It would be unrealistic to suggest that illegal digging(50) would stop if artifacts were sold on the open market.But the demand for the clandestine product would besubstantially reduced. Who would want an unmarkedpot when another was available whose provenance wasknown, and that was dated stratigraphically by theprofessional archaeologist who excavated it?Q.The author’s argument concerning the effect of the official sale of duplicate artifacts on illegal excavation is based on which of the following assumptions?

Top Courses for GMAT

A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer?
Question Description
A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? for GMAT 2024 is part of GMAT preparation. The Question and answers have been prepared according to the GMAT exam syllabus. Information about A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? covers all topics & solutions for GMAT 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer?.
Solutions for A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? in English & in Hindi are available as part of our courses for GMAT. Download more important topics, notes, lectures and mock test series for GMAT Exam by signing up for free.
Here you can find the meaning of A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer?, a detailed solution for A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? has been provided alongside types of A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice A new security software authenticates a person by scanning the person’s hand and matching the information obtained from the same with the information stored in the system. However, recent laboratory tests have shown that the software recognized and authenticated people whose information in the system was stored before they recently started suffering from chemotherapy-induced acral erythema, a syndrome that is associated with pain and peeling on the palms and soles of the feet, whicheven leads to a loss offingerprints. Therefore, it is likely that the security system does not use the finger-prints of a person as a metric for authentication.Which of the following would be most helpful to evaluate the argument?a)Whether the laboratory tests checked for correlation between other possible information gained from hand scans such as the length, width and thickness of the hand, fingers and jointsb)Whether the people suffering from the syndrome were at an initial stage of the disease when the peeling of the skin is mostly limited to the feetc)Whether people currently suffering from chemotherapy-induced acral erythema are likely to be authenticated by other security software such as facial and voice recognition softwared)Whether the software can be hacked by replicating features such as temperature and curvature of the hande)Whether the software alternatively uses foot prints to authenticate peopleCorrect answer is option 'B'. Can you explain this answer? tests, examples and also practice GMAT tests.
Explore Courses for GMAT exam

Top Courses for GMAT

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev