SlideShare a Scribd company logo
1 of 2
Based on what you have learned in this chapter and using
appropriate components, properly
construct
an argument to:
(1)
support or refute the view that all undergraduate students
should be required to take a course in cyberethics; and
(2)
apply the seven steps (in Section 3.8) to your argument.
Please elaborate (beyond a yes or no answer) and provide your
rationale in support of your responses
(
comprehension)
Using appropriate components
construct
an argument
for
or
against
the view that privacy protection should be improved in e-
commerce transactions. Next
evaluate
your arguments against the rules for valid, inductive, and
fallacious arguments.
Does
your argument contain any of the common or “informal”
fallacies discussed in Section 3.9?
If so, elaborate.
Please elaborate (beyond a yes or no answer) and provide your
rationale in support of your responses
(
knowledge)

More Related Content

Similar to Based on what you have learned in this chapter and using appro.docx

AssignmentSelect two of the scenarios in the Applications list .docx
AssignmentSelect two of the scenarios in the Applications list .docxAssignmentSelect two of the scenarios in the Applications list .docx
AssignmentSelect two of the scenarios in the Applications list .docxrock73
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxmydrynan
 
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxMODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxaudeleypearl
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docxmelbruce90096
 
Disc 1_ Team 7.docx1Report 1 Behavior Based Safe.docx
Disc 1_ Team 7.docx1Report 1  Behavior Based Safe.docxDisc 1_ Team 7.docx1Report 1  Behavior Based Safe.docx
Disc 1_ Team 7.docx1Report 1 Behavior Based Safe.docxlynettearnold46882
 

Similar to Based on what you have learned in this chapter and using appro.docx (6)

AssignmentSelect two of the scenarios in the Applications list .docx
AssignmentSelect two of the scenarios in the Applications list .docxAssignmentSelect two of the scenarios in the Applications list .docx
AssignmentSelect two of the scenarios in the Applications list .docx
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
 
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxMODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
 
Week 3. Discussion .docx
Week 3.   Discussion                                            .docxWeek 3.   Discussion                                            .docx
Week 3. Discussion .docx
 
Disc 1_ Team 7.docx1Report 1 Behavior Based Safe.docx
Disc 1_ Team 7.docx1Report 1  Behavior Based Safe.docxDisc 1_ Team 7.docx1Report 1  Behavior Based Safe.docx
Disc 1_ Team 7.docx1Report 1 Behavior Based Safe.docx
 
Cmgt 400 entire course
Cmgt 400 entire courseCmgt 400 entire course
Cmgt 400 entire course
 

More from cherishwinsland

Based on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docxBased on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docxcherishwinsland
 
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docxBased on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docxcherishwinsland
 
Based on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docxBased on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docxcherishwinsland
 
Based on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docxBased on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docxcherishwinsland
 
Based on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docxBased on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docxcherishwinsland
 
Based on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docxBased on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docxcherishwinsland
 
Based on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docxBased on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docxcherishwinsland
 
Based on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docxBased on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docxcherishwinsland
 
Based on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docxBased on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docxcherishwinsland
 
Based on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docxBased on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docxcherishwinsland
 
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docxBased on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docxcherishwinsland
 
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docxBased on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docxcherishwinsland
 
Based on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docxBased on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docxcherishwinsland
 
Based on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docxBased on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docxcherishwinsland
 
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docxBased on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docxcherishwinsland
 
Based on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docxBased on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docxcherishwinsland
 
Based on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docxBased on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docxcherishwinsland
 
Based on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docxBased on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docxcherishwinsland
 
Based on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docxBased on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docxcherishwinsland
 
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docxBased on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docxcherishwinsland
 

More from cherishwinsland (20)

Based on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docxBased on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docx
 
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docxBased on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
 
Based on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docxBased on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docx
 
Based on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docxBased on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docx
 
Based on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docxBased on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docx
 
Based on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docxBased on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docx
 
Based on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docxBased on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docx
 
Based on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docxBased on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docx
 
Based on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docxBased on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docx
 
Based on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docxBased on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docx
 
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docxBased on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
 
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docxBased on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
 
Based on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docxBased on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docx
 
Based on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docxBased on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docx
 
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docxBased on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
 
Based on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docxBased on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docx
 
Based on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docxBased on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docx
 
Based on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docxBased on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docx
 
Based on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docxBased on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docx
 
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docxBased on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Based on what you have learned in this chapter and using appro.docx

  • 1. Based on what you have learned in this chapter and using appropriate components, properly construct an argument to: (1) support or refute the view that all undergraduate students should be required to take a course in cyberethics; and (2) apply the seven steps (in Section 3.8) to your argument. Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses ( comprehension) Using appropriate components construct an argument for or against the view that privacy protection should be improved in e- commerce transactions. Next evaluate your arguments against the rules for valid, inductive, and fallacious arguments. Does your argument contain any of the common or “informal” fallacies discussed in Section 3.9? If so, elaborate. Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses