Text Passwords

Welcome! You are encouraged to register with the site and login (for free). When you register, you support the site and your question history is saved.

The average text-format computer password is highly effective at stopping casual attempts by hackers to break into a critical, secured computer systems but can be hacked within a few minutes by a powerful computer permitted to make repeated remote login attempts. No critical, secured computer system can afford to be defended by a measure that will last as little time as a few minutes. Biometric authentication, on the other hand, has no vulnerability to remote repeated login attempts. Clearly, therefore, for critical, secured computer systems, the average text-format computer password can play no part in effectively stopping hacking attempts.

The argument is most vulnerable to the objection that it fails to

Review: Text Passwords


Explanation

Reading comprehension: our ears should prick up at the phrase "play no part." We can see by altering or omitting this phrase that represents a critical detail in the argument. Text passwords may be inferior in some ways, but that doesn't mean it won't help to use them in addition to some other measures; the argument fails to recognize that. We have a critical detail filter to apply to the answer choices, something like, "maybe the argument is wrong because it's worth using text passwords along with other measures."

Applying the filter: We compare the answer choices with our expectation. Choice (A) is immaterial, because the argument isn't discussing "noncritical" systems. Choice (B) contradicts the evidence we have been given, the argument does give an alternative to text passwords--it mentions biometrics. Choice (C) is irrelevant. Choice (D) delivers on our expectation: it says, in other words, text passwords can "play a part." Choice (E) is irrelevant, because the argument and its conclusion are about average text-format passwords only, not stronger ones.

Logical proof: We can't apply the negation test exactly to an answer choice, given the way they are wording. But we can negate the idea being conveyed by imagining that the argument did consider using both methods. We can confirm that such an argument would be stronger; it would have better grounds to say that text passwords can "play no part." We have confirmed that we are discussing a point of failure in the argument. The correct answer is (D).


If you believe you have found an error in this question or explanation, please contact us and include the question title or URL in your message.