PT105.S2.Q14

PrepTest 105 - Section 2 - Question 14

Show summary

Yolanda: Gaining access to computers without authorization and manipulating the data and programs they contain is comparable to joyriding in stolen cars; both involve breaking into private property and treating it recklessly. ██████████ ████████ ██ ███ ████ █████████ █████ ███████ ██ ██████████ █████████ ███████ ███████ ████ ████████████ ████████ ██ ██████ ██ ███ ████ ██ ████████ ███████

██████ █ █████████ ███ ████████ ████████████ ███ ██ ███████ ███████ ███████ ██ █████████ █████ ██████ ████ ███████ ██ █████ █████ █████ ███████ ███ █████████ ████████ ██████ ████ █████ ████████ ████ ██ ███████

Summarize Argument: Counter-Position

Arjun concludes that computer crimes also cause physical harm to people. He supports this with an example: unauthorized use of hospital medical records could damage data systems that are critical to human lives.

Identify and Describe Flaw

Arjun concludes that computer crimes do cause physical harm based on the example that unauthorized use of hospital medical records could damage data systems that are critical to human lives. In other words, in order to draw his conclusion, he must assume that something that could happen actually will happen.

Show answer
14.

The reasoning in Arjun's response ██ ██████ ███████ ██

a

fails to maintain █ ███████████ ████ ██ █████████ ████████

b

denies Yolanda's conclusion ███████ █████████ ████████ ███████ ██

c

relies on the █████████ ██ █ ██████████ ████ ██ ███ ████ █████ ██ ██ ████████

d

mistakes something that █████ ██ ███ ██████████ ███ █████████ ████ ██ █████████ ███ ███ ██████████

e

uses as evidence █ ██████████ ████ ██ ████████████ ████ ███ ███ ██████████

Confirm action

Are you sure?