fingerprint recognition software

This topic has expert replies
User avatar
Master | Next Rank: 500 Posts
Posts: 345
Joined: Sun Dec 21, 2008 10:57 pm
Thanked: 6 times
Followed by:3 members

fingerprint recognition software

by himu » Sun Oct 28, 2012 5:32 am
A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not on file, identifies a person's fingerprint by analyzing not only the detailed structure of the fingerprint, but also such characteristics as the level of pressure upon which the finger placed on the scanner and the finger's skin tone. Even the most adept computer hackers cannot duplicate all the characteristics the software analyzes.

Which of the following can be logically concluded from the passage above?

Use of the recognition software is largely impractical due to the time it takes to record and analyze a fingerprint.

Computers equipped with the recognition software will soon be installed in most financial firms that deal with sensitive electronic information.

It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints.

Fingerprint recognition software has taken many years and tremendous investment to develop and perfect.

The fingerprint recognition software is so sensitive that many authorized users are often denied legitimate access.

User avatar
Master | Next Rank: 500 Posts
Posts: 279
Joined: Mon Jun 25, 2012 10:56 pm
Thanked: 60 times
Followed by:10 members

by anuprajan5 » Sun Oct 28, 2012 6:42 am
The answer is C because the level of pressure angle is lacking
Regards
Anup

The only lines that matter - are the ones you make!

https://www.youtube.com/watch?v=kk4sZcG ... ata_player

Junior | Next Rank: 30 Posts
Posts: 22
Joined: Sun Aug 10, 2008 5:54 am

by kheba » Tue Oct 30, 2012 12:36 pm
The answer is C ... the passage clearly states that recognition algorithms factor not only the unique features of finger prints but also the pressure and other parameters... hence a computer hacker can't just simulate the finger print and hack in ..

User avatar
Master | Next Rank: 500 Posts
Posts: 345
Joined: Sun Dec 21, 2008 10:57 pm
Thanked: 6 times
Followed by:3 members

by himu » Wed Oct 31, 2012 9:16 am
Correct Answer: C

The correct answer to this question is (C). This is an INFERENCE question, requiring the test taker to choose the correct answer that must be true based on the information provided in the stimulus. (A) is incorrect as the passage provides no information with regard to the speed of recording and analyzing the fingerprint; as such, no related conclusion can be drawn. (B) is incorrect as the passage provides no information with regard to the installation of computers that possess the software in specific locations; as such, no related conclusion can be drawn. (C) This is the correct answer. The passage states that the software detects more characteristics than those that the most successful hackers are able to duplicate; as such, we can conclude it would be impossible for any top hacker to gain access to a protected computer solely by replicating one of multiple characteristics analyzed by the software. (D) is incorrect as the passage provides no information with regard to the time and investment costs associated with the development of the software; as such, no related conclusion can be drawn. (E) is incorrect as the passage provides no information with regard to errors produced by the software; as such, no related conclusion can be drawn.

User avatar
Junior | Next Rank: 30 Posts
Posts: 11
Joined: Sat Sep 10, 2016 10:37 pm

by oishik2910 » Sat Sep 10, 2016 10:51 pm
hello
why E is not correct
i thought option C is very bold
it states any hacker cannot hack means no one ,dont gmat prefers general answers than too strong extremities

User avatar
Senior | Next Rank: 100 Posts
Posts: 51
Joined: Fri Sep 09, 2016 11:59 pm
Thanked: 20 times

by MBA Challengers » Mon Sep 12, 2016 3:33 am
Looking at the question from the following approach:
Premise 1: The compute denies access to anyone whose fingerprints are not stored
Premise 2: Fingerprint identification is by fingerprint structure and other factors like level of pressure and skin tone
Conclusion: Not possible to hack for even most adept hackers since all these characteristics cannot be duplicated

Now checking for the options:
Option A: The passage says nothing about the time taken. Incorrect
Option B: The passage does not talk about the use to which such computers will be put to. Incorrect
Option C: This is almost the above passage re-worded as it talks about the fact that fingerprint structure ALONE will not make hacking possible. Possible option
Option D: The passage talks nothing about the development phase. Incorrect
Option E: The passage clearly mentions that the computer gives access to all users who have their fingerprints stored on file. Incorrect

Considering the above reasons, the correct answer is C
Log on to www.mbachallengers.com for
Easy strategic GMAT prep
For any queries mail us at [email protected]
Follow MBA Challengers on Facebook