A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not on file, identifies a person's fingerprint by analyzing not only the detailed structure of the fingerprint, but also such characteristics as the level of pressure upon which the finger placed on the scanner and the finger's skin tone. Even the most adept computer hackers cannot duplicate all the characteristics the software analyzes.


Which of the following can be logically concluded from the passage above?



A. Use of the recognition software is largely impractical due to the time it takes to record and analyze a fingerprint.


B. Computers equipped with the recognition software will soon be installed in most financial firms that deal with sensitive electronic information.


C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints.


D. Fingerprint recognition software has taken many years and tremendous investment to develop and perfect.


E. The fingerprint recognition software is so sensitive that many authorized users are often denied legitimate access.


A. Use of the recognition software is largely impractical due to the time it takes to record and analyze a fingerprint. Nothing in the passage about the time taken to analyze and recognize a fingerprint. Eliminate.


B. Computers equipped with the recognition software will soon be installed in most financial firms that deal with sensitive electronic information. Nothing in the passage about when or where the software will be installed. Eliminate.


C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints. Correct answer. The passage tells us that the software analyzes things other than just the structure of the fingerprint. Therefore, a hacker whose sole skill is replicating the structure cannot gain access basis that skill. 


D. Fingerprint recognition software has taken many years and tremendous investment to develop and perfect. Nothing in the passage about the time or investment taken to develop and perfect the software. Eliminate.


E. The fingerprint recognition software is so sensitive that many authorized users are often denied legitimate access. The passage does not address the sensitivity of the software. Eliminate.