Reading Comprehension
Passage Breakdown
The passage describes a debate over Web copyright: creators want stronger laws to stop copying, while users worry that restricting access will harm the Web’s openness. The author argues that posting a document online is like leaving a public phone message and making a link is like giving out the phone number—posting the document means the poster controls access. Because the poster can limit access (for example with a password), merely linking to a page is not the same as copying or distributing it, and stricter copyright laws that punish linking would hurt the Web as a free forum.
Logic Breakdown
Approach: identify the two measures the passage contrasts — strengthening copyright law (a broad, legal, heavy-handed restriction) versus requiring passwords (a targeted, less-intrusive access-control technique) — and choose the answer that pairs an extreme ban/legal restriction with a less-intrusive safety/controls alternative. Supporting sentences: "For example, A may require a password to gain entry to A's Web page..." and "Such a solution would compromise the openness of the Web somewhat, but not as much as the threat of copyright infringement litigation."
Passage Stimulus
Passage Redacted
Unlock Full Passage18.Based on the passage, the relationship between strengthening current copyright laws and relying on passwords to restrict access to a Web document is most analogous to the relationship between
Correct Answer
C
The passage sets up two responses to the risk of infringement: a sweeping legal remedy (strengthening copyright law) and a narrower owner-controlled technical remedy (passwords). That is analogous to two ways of reducing risk in an activity: banning it outright versus allowing it but reducing risk by safety measures. Option C pairs 'prohibiting a sport' (an extreme ban/legal prohibition analogous to strengthening the law) with 'relying on participants to employ proper safety gear' (a less intrusive protective measure analogous to using passwords). The passage explicitly gives the password example ("For example, A may require a password to gain entry to A's Web page...") and states that this would compromise openness less than litigation ("...but not as much as the threat of copyright infringement litigation."), supporting this ban-vs-less-intrusive-alternative mapping.
Upgrade Your Prep
Ready to go beyond free explanations?
LSAT Perfection is the #1 modern LSAT prep platform, trusted by thousands of students for comprehensive test strategies, advanced drilling, and full analytics on every PrepTest.
Detailed explanations for 59 PrepTests
Advanced drillset builder
Personalized analytics
Built-in Wrong Answer Journal