Please enable JavaScript.
Coggle requires JavaScript to display documents.
LSAT Claims Questions 5.3 - Coggle Diagram
LSAT Claims Questions 5.3
Introduction to Claims Questions
Purpose
Assess ability to identify claims supported or unsupported by the passage and infer the author’s stance.
Focus
Questions target main ideas, supporting details, and implications, requiring precise textual evidence.
Sample Passage 1: Vocabulary Development
Passage Context
Examines the fascination with word origins and the importance of vocabulary development in English for intellectual and educational purposes
Key Points
Word knowledge is crucial in literate societies and contributes to school curriculum success (lines 12-15)
Languages are dynamic, reflecting cultural changes; lexical stock evolves as concepts change (lines 20-23)
English lexicon includes Anglo-Saxon roots, borrowed words from contacted communities, and new words via prefixes, suffixes, compounding, or creation (lines 36-49)
The primary influence on speech is the language of one’s birth country (lines 60-63).
Sample Questions
Claim About Lexical Stock
Question
Which claim does the author make about the lexical stock of a language?
Correct Answer
(C) Many English words have nothing to do with the language’s Anglo-Saxon core
Explanation
Supported by lines 37-40, which note thousands of borrowed words from other language communities
Incorrect Options
(A) Misinterprets the 200-year example as a fixed lifespan (lines 27-29)
(B) No mention of Roman times
(D) Contradicts lines 36-49 on new word creation
(E) Contradicts lines 27-29 on frequent lexical change
Claim About Word Origins
Question
Which claim about word origins is supported?
Correct Answer
(A) There are myriad possible origins for words.
Explanation
Third paragraph (lines 36-49) details multiple word formation methods (borrowing, prefixes, suffixes, compounding, creation)
Incorrect Options
(B, C) Contradict lines 37-40 and the paragraph’s theme
(D) No one-to-one creation/dropout relationship mentioned
(E) Contradicts lines 20-23 on cultural/historical influence
Least Supported Claim
Question
Which claim is least supported?
Correct Answer
(E) The least important influence on one’s speech is which language we learn to speak first
Explanation
Contradicts lines 60-63, which emphasize the language of one’s birth country as the most important influence
Supported Claims
(A) Lines 20-23; (B, D) Lines 23-27; (C) Lines 63-65
Lexicology Background
Question
What does a good background in lexicology include?
Correct Answer
(A) Cultural and historical education
Explanation
Lines 20-23 link language to culture and history, implying lexicology includes these aspects
Incorrect Options
(B, C, D, E) No mention of religion, communications, philosophy, science, math, or technology
Support for Educational Claim
Question
Which supports the claim that word knowledge aids curriculum achievement (lines 12-15)?
Correct Answer
(B) Language study fosters comprehension and critical thinking
Explanation
These skills broadly enhance academic performance, aligning with lines 12-15
Incorrect Options
(A, C, D, E) Lack causal evidence or specific textual support
English Language Example
Question
Why does the author use the English language as an example?
Correct Answer
(D) It is a prime example of diverse lexical origins
Explanation
Lines 36-49 highlight English’s varied word sources (Anglo-Saxon, borrowed, derived, compounded)
Incorrect Options
(A) No mention of English not being native to America
(B) Contradicts the passage’s focus on diverse origins
(C) No reference to Native American influence
(E) Exaggerates; no claim about incomprehensibility of old words
III. Sample Passage 2: Internet Fraud and Identity Theft
Passage Context
Highlights how criminals easily obtain personal data in public and online, leading to identity theft and related crimes
Key Points
Methods include “shoulder surfing” (lines 3-10), “dumpster diving” (lines 12-18), mail interception (lines 12-18), and email scams (lines 37-44)
New technologies create fraud opportunities, requiring precautions (third paragraph)
Identity theft enables crimes like fraudulent loans, withdrawals, or purchases (lines 46-54)
Victims may not notice damage until significant harm occurs (lines 54-62)
Sample Questions
Claim About Identity Theft
Question
Which claim is supported?
Correct Answer
(A) People must keep personal information secure to avoid identity theft.
Explanation
Supported by descriptions of how criminals exploit exposed data (lines 3-18, 46-54)
Incorrect Options
(B) No blame placed on victims
(C) Contradicts “wide range” of crimes (lines 46-54)
(D) Overlaps with (A) but is less precise
(E) No mention of car theft as identity theft
Self-Defense Against Identity Theft
Question
Which is NOT a good self-defense measure?
Correct Answer
(D) Making all personal phone calls from a cell phone
Explanation
Public cell phone use increases risk (page 5), unlike (A) shredding documents, (B) securing mail, (C) public awareness, and (E) avoiding spam (lines 12-44)
Claim About “Dumpster Diving”
Question
Which claim does the author make?
Correct Answer
(C) It can be done without the victim realizing it until too late.
Explanation
Lines 12-18 and 54-62 note victims may not notice until significant damage occurs
Incorrect Options
(A, D, E) No claims about commonality, sanitation workers, or specific credit card programs
(B) No specific group accused
Purpose of Internet Fraud Discussion
Question
Why does the author discuss internet fraud?
Correct Answer
(B) New technology requires precautions against new victimization methods.
Explanation
Third paragraph (page 6) emphasizes technology’s fraud risks and need for caution
Incorrect Options
(A) Contradicts email fraud risks (page 6)
(C) No mention of internet billing
(D, E) Contradict the passage’s warning of risks
Undermining Author’s Warning
Question
Which undermines the author’s call to be wary of identity theft?
Correct Answer
(B) Fraud and identity theft are the most common crimes in America.
Explanation
High prevalence might downplay the need for individual caution (page 6).
Incorrect Options
(A, C) Punishment or legality elsewhere is irrelevant.
(D) Reinforces the need for caution.
(E) Author’s personal history is irrelevant.
Least Supported Claim
Question
Which claim is least supported?
Correct Answer
(C) There is no truly efficient way to combat fraud or identity theft.
Explanation
Lines 54-62 suggest preventive measures can reduce risk, contradicting (C).
Supported Claims
(A, D, E) Lines 46-62; (B) Third paragraph.
IV. Strategies for Solving Claims Questions
Locate Textual Evidence
Use specific lines (e.g., lines 37-40 for lexical diversity) to confirm supported claims.
Identify Contradictions
Eliminate options that contradict explicit statements (e.g., lines 60-63 for language influence).
Infer Author’s Intent
Deduce likely claims based on tone and focus (e.g., caution in fraud passage).
Evaluate Scope
Avoid options that overgeneralize or introduce unmentioned concepts (e.g., Roman times, Native Americans).
Prioritize Precision
Choose answers that closely align with the passage’s wording and intent.