The fire broke out during the busiest office hours; luckily, the staff was well trained for such _____.
(A)practices
(B)drills
(C)emergencies
(D)developments
Unless we install more speed cameras, the speed limits on this stretch of road will be difficult to _____.
(A)release
(B)enforce
(C)violate
(D)register
The traffic policewoman had Linda _____ while doing her speed patrols because Linda had driven too fast andviolated the traffic regulation.
(A)broken in
(B)called off
(C)pulled over
(D)rolled out
A person’s right to freedom is _____ if s/he commits a crime and is convicted by a court of law as guilty.
(A)restricted
(B)translated
(C)undertaken
(D)volunteered
The traffic police officer had a vehicle _____ because it was being parked illegally on the road.
(A)eased off
(B)plugged in
(C)towed away
(D)wiped off
The police try very hard to find the evidence to convict the murderer. They _____ on the most likely suspect whocannot provide the alibi.
(A)do a runner
(B)drop the hammer
(C)cop a plea
(D)beat the rap
The woman who was riding a scooter refused to be investigated by the police. She was hence sent to the policestation in _____.
(A)handcuffs
(B)drones
(C)flashlights
(D)pistols
Tim commits _____ as he set fire to scooters that had parked outside the apartment, causing flame and heavysmoke inside the building that killed many people.
(A)arson
(B)assault
(C)abortion
(D)abduction
When Peggy received a message on her cell phone, informing her of picking up her ordered package, she was_____ about the truth of the information.
(A)criminal
(B)doubtful
(C)enormous
(D)grateful請依下文回答第41 題至第45 題Extreme heat is defined as summertime temperatures that are much hotter and/or humid than average. Heat-relatedillnesses,
The police got a(n)call that said money was being stolen from a local bank.
(A)anonymous
(B)collect
(C)deficient
(D)ancient
heat exhaustion or heat stroke, happen when the body is not able to properly cool itself. In such cases, aperson’s body temperature rises faster
Elder abuse can take on various forms, including economic exploitation, physical and emotionalabuse, as well as neglect. Sadly, those who commit elder abuse orof elder abuse may befamily members.
(A)pathologists
(B)pedestrians
(C)perpetrators
(D)prostitutes
it can cool itself down. This can cause damage to the brain and
The goal of airport security is to safeguard passengers, crew, and staff byfor forbidden itemsand preventing acts of terrorism, hijacking, and other criminal activities that could endanger thesafety of air travel.
(A)bribing
(B)pirating
(C)conveying
(D)screening
vitalorgans.The following are tips for preventing heat-related illnesses:* Stay Cool Indoors: Stay in an air-conditioned place as much as possible.*
In that country, for sentences in excess of four years, prisoners are eligible to be released onafterserving one-third of their sentences.
(A)misdemeanor
(B)parole
(C)dichotomy
(D)penalty
Outdoor Activities Carefully: Try to limit your outdoor activity to
_______ is a criminal charge involving violence, so the prosecution takes it very seriously, especiallyif a weapon is involved or it results in injury.
(A)Penalty
(B)Assault
(C)Dissonance
(D)Fracture
it is coolest, like morning and evening hours.* Know the Signs: Learn the signs and symptoms of heat-related illnesses and how to treat them.41
(A)as
(B)like
(C)and
(D)but42
(A)than
(B)then
(C)that
(D)yet43
(A)ones
(B)another
(C)other
(D)others44
(A)Schedule
(B)Concern
(C)Motivate
(D)Trace45
(A)what
(B)where
(C)which
(D)when請依下文回答第46 題至第50 題Ponzi and pyramid schemes are both investment frauds. They both involve deceiving others by promising substantialincome or returns on an investor’s initial investment. Unlike a regular investment, these schemes can offer consistentprofits only as long as the number of investors continues to increase. Once the number tapers off, so does the money. Butthere are inherent differences between the two.The investment manager of a Ponzi scheme will promise you substantially higher returns than any traditionalinvestment with little to no risk. Investment strategies are often too complicated to understand and you may not receiveany financial documents. The “returns” actually come from the incoming funds contributed by later investors.Pyramid schemes similarly offer big returns for little investment capital. However, they require individuals to payan entrance fee and/or purchase products/services in order to participate. These people are then required to bring in morepeople to the scheme. People at the top are paid the most, receiving a portion of the money that the new recruits contribute.Those at the bottom of the pyramid make little to nothing, especially when no new individuals are recruited.
To prevent identity theft, you should regularly monitor your credit reports and financial statementsto detect anyor suspicious activity.
(A)credible
(B)legitimate
(C)impeccable
(D)unauthorized
Which of the following is a feature shared by both Ponzi schemes and pyramid schemes?
(A)Both schemes attract victims with promises of high profits on investments.
(B)Both schemes are unlike regular investments because they offer a fixed interest rate.
(C)Neither of the schemes ask investors to put any money into their accounts at first.
(D)The operations of both schemes are quite transparent.
While driving home from a party last night, I was stopped by the police and asked to take abreathalyzer test. Since I had only consumed orange juice at the party, my breath alcoholwasnormal.
(A)acceleration
(B)concentration
(C)disinfectant
(D)intolerance50720-5102051220-51320
Which of the following statements is NOT true?
(A)Ponzi schemes only ask for investments, while pyramid schemes also require an entrance fee and/or purchaseof products.
(B)Ponzi schemes only ask people to invest money, but pyramid schemes ask people to recruit new members.
(C)All investors in a Ponzi scheme can become victims, but late comers to a pyramid scheme usually bear thehighest risk.
(D)Ponzi schemes yield higher profits than pyramid schemes.
The government is being warned about a network of criminals carrying out a sophisticated systemof credit card.
(A)treason
(B)rectitude
(C)fraud
(D)continence
What would be the best title for this passage?
(A)Everything You Need to Know About Ponzi Schemes.
(B)Everything You Need to Know About Pyramid Schemes.
(C)Warning Signs of Ponzi Schemes and Pyramid Schemes.
(D)The Differences Between Ponzi Schemes and Pyramid Schemes.
The court ordered the convicted woman to maketo the family that she had done so muchharm to.
(A)simulations
(B)reparations
(C)conventions
(D)incursions
Where would this passage most likely appear?
(A)A textbook on business management.
(B)A report on the economic prospects.
(C)A warning against financial scams.
(D)A recommendation for investors.
The Taiwanese government has implemented new laws that prohibit the production, sale, andimportation of e-cigarettes. The legal age for smoking has also been raised from 18 to 20 to curbyoung people'saddiction.
(A)cocaine
(B)ecstasy
(C)heroin
(D)nicotine請依下文回答第51 題至第55 題The Customs Administration’s canine division last year helped customs officers
What does “taper off” mean?
(A)Grow.
(B)Decline.
(C)Fluctuate.
(D)Average.
758kg ofillegal drugs, which were valued at NT$330 million (US$11.86 million). Most of the narcotics detectedby sniffer dogs were ketamine, the agency said. Taiwan has 37 detection dogs, with each dog workingwith one dog handler. Detection dogs are put
duty whenever high-risk flights arrive, and theymust finish
the luggage in about 10 minutes, it added. With the establishment of the MaritimeExpress Consignments Clearance service at the Keelung Customs Office and the construction of TaiwanTaoyuan International Airport’s Terminal 3 expected to be completed in 2026, the center said it is aimingto expand the canine division from 37 to 44 sniffer dogs by 2025. The center said that its main task in thenext few years is to train more Labradors to find tobacco, narcotics or explosives
the MilitaryPolice Command, the National Fire Agency, the National Police Agency, the Bureau of Animal and PlantInspection and Quarantine, and other agencies. The success rate of training Labrador puppies to becomedetection dogs has reached more than 20 percent, as puppies born from second-generation dams tend tobe stronger and healthier, it said. As the
of puppies is expected to double in the next three years,people living south of Taoyuan or north of Yunlin County are encouraged to become foster families ofpuppies, the center said, adding that companies in central Taiwan can offer facilities for puppy training.51
(A)intercept
(B)intrigue
(C)impact
(D)imply52
(A)by
(B)with
(C)on
(D)in53
(A)to sniff
(B)sniff
(C)sniffed
(D)sniffing54
(A)on behalf of
(B)regardless of
(C)insomuch as
(D)in spite of55
(A)volume
(B)number
(C)latitude
(D)length請依下文回答第56 題至第60 題With so many people crossing borders every day, how do we know we’re not letting dangerous peopleinto our countries? One response is biometric identification technology. It has been developed to recognizeindividuals and to identify criminals. In fact, biometric identification is not a new invention. Lawenforcement agencies have been using photographs and fingerprints as biometric identifiers since the late19th century. Today, biometric identification technology, including both physiological and behavioralbiometrics, has become increasingly prevalent as a means of enhancing security and protecting individuals'interests.50720-5102051220-51320Physiological biometrics, such as fingerprints and facial features, use human morphology to identifyor recognize individuals. Besides fingerprint scanners, there are software programs that identify faces,palms, and irises. Scanning these physical features ensures that the person being scanned is who he or sheclaims to be. Unlike personal identification numbers, which are used to access bank accounts, biometricidentifiers are extremely difficult, if not impossible, for criminals to steal.Behavioral biometrics can also be used to identify people. Certain behaviors are unique to individuals,such as their speech or the way they type. The classic behavioral biometric marker is a person's signature,but it can be problematic as it can be copied. However, people do automatically recognize subtleties in theway a person speaks, such as intonation and regional accents. Typing patterns, likewise, would be verydifficult to observe and mimic convincingly.Biometrics can have two potential applications: identification and identity verification. Identificationuses biometric information to discover the identity of an unknown person. DNA evidence has joinedfingerprints as a common tool of law enforcement for this purpose. Today, we use passports to verify ouridentity when crossing borders, but passports can be stolen or forged. An effective biometric identificationsystem would be difficult to fool. Because of this, many countries are considering biometric additions toor replacements of existing identification system. India, for instance, has already implemented such asystem, which utilizes fingerprint and iris scans, in addition to photographs.While biometric identification technology shows promise in various applications, there are ethicalconcerns surrounding the development of biometric identification technology. Critics worry about thepossibility of criminal uses of the technology, as legitimate organizations can use biometric scanners toverify personal information. And civil liberties advocates are concerned about the potential for abuse byauthorities. Therefore, policymakers will need to balance security and law enforcement against personalfreedom and privacy. Ethical considerations must be taken into account when developing biometricidentification technology.
What is the main idea of this passage?
(A)The ethical problems with biometric identification.
(B)Biometric identification, its uses, and its challenges.
(C)Biometric identification and its history in law enforcement.
(D)The difference between physiological and behavioral biometrics.
According to the passage, which of the following can be scanned as a physiological biometricidentifier?
(A)Bank accounts.
(B)Brain waves.
(C)Palms and irises.
(D)Speaking speed.
According to the passage, what is a traditional behavioral biometric marker?
(A)Signatures.
(B)Facial features.
(C)Regional accents.
(D)Typing patterns.
What does the word “forged” mean?
(A)built
(B)faked
(C)missed
(D)shaped
Which ethical concern about biometric identification technology is NOT mentioned in the passage?
(A)The potential for illicit usage.
(B)The likelihood of misuse by authorities.
(C)The dispute over India's disregard for civil liberties.
(D)The balance between ensuring security and protecting personal privacy.