The police got a(n)call that said money was being stolen from a local bank.
(A)anonymous
(B)collect
(C)deficient
(D)ancient
Elder abuse can take on various forms, including economic exploitation, physical and emotionalabuse, as well as neglect. Sadly, those who commit elder abuse orof elder abuse may befamily members.
(A)pathologists
(B)pedestrians
(C)perpetrators
(D)prostitutes
The goal of airport security is to safeguard passengers, crew, and staff byfor forbidden itemsand preventing acts of terrorism, hijacking, and other criminal activities that could endanger thesafety of air travel.
(A)bribing
(B)pirating
(C)conveying
(D)screening
In that country, for sentences in excess of four years, prisoners are eligible to be released onafterserving one-third of their sentences.
(A)misdemeanor
(B)parole
(C)dichotomy
(D)penalty
_______ is a criminal charge involving violence, so the prosecution takes it very seriously, especiallyif a weapon is involved or it results in injury.
(A)Penalty
(B)Assault
(C)Dissonance
(D)Fracture
To prevent identity theft, you should regularly monitor your credit reports and financial statementsto detect anyor suspicious activity.
(A)credible
(B)legitimate
(C)impeccable
(D)unauthorized
While driving home from a party last night, I was stopped by the police and asked to take abreathalyzer test. Since I had only consumed orange juice at the party, my breath alcoholwasnormal.
(A)acceleration
(B)concentration
(C)disinfectant
(D)intolerance50720-5102051220-51320
The government is being warned about a network of criminals carrying out a sophisticated systemof credit card.
(A)treason
(B)rectitude
(C)fraud
(D)continence
The court ordered the convicted woman to maketo the family that she had done so muchharm to.
(A)simulations
(B)reparations
(C)conventions
(D)incursions
The Taiwanese government has implemented new laws that prohibit the production, sale, andimportation of e-cigarettes. The legal age for smoking has also been raised from 18 to 20 to curbyoung people'saddiction.
(A)cocaine
(B)ecstasy
(C)heroin
(D)nicotine請依下文回答第51 題至第55 題The Customs Administration’s canine division last year helped customs officers
758kg ofillegal drugs, which were valued at NT$330 million (US$11.86 million). Most of the narcotics detectedby sniffer dogs were ketamine, the agency said. Taiwan has 37 detection dogs, with each dog workingwith one dog handler. Detection dogs are put
duty whenever high-risk flights arrive, and theymust finish
the luggage in about 10 minutes, it added. With the establishment of the MaritimeExpress Consignments Clearance service at the Keelung Customs Office and the construction of TaiwanTaoyuan International Airport’s Terminal 3 expected to be completed in 2026, the center said it is aimingto expand the canine division from 37 to 44 sniffer dogs by 2025. The center said that its main task in thenext few years is to train more Labradors to find tobacco, narcotics or explosives
the MilitaryPolice Command, the National Fire Agency, the National Police Agency, the Bureau of Animal and PlantInspection and Quarantine, and other agencies. The success rate of training Labrador puppies to becomedetection dogs has reached more than 20 percent, as puppies born from second-generation dams tend tobe stronger and healthier, it said. As the
of puppies is expected to double in the next three years,people living south of Taoyuan or north of Yunlin County are encouraged to become foster families ofpuppies, the center said, adding that companies in central Taiwan can offer facilities for puppy training.51
(A)intercept
(B)intrigue
(C)impact
(D)imply52
(A)by
(B)with
(C)on
(D)in53
(A)to sniff
(B)sniff
(C)sniffed
(D)sniffing54
(A)on behalf of
(B)regardless of
(C)insomuch as
(D)in spite of55
(A)volume
(B)number
(C)latitude
(D)length請依下文回答第56 題至第60 題With so many people crossing borders every day, how do we know we’re not letting dangerous peopleinto our countries? One response is biometric identification technology. It has been developed to recognizeindividuals and to identify criminals. In fact, biometric identification is not a new invention. Lawenforcement agencies have been using photographs and fingerprints as biometric identifiers since the late19th century. Today, biometric identification technology, including both physiological and behavioralbiometrics, has become increasingly prevalent as a means of enhancing security and protecting individuals'interests.50720-5102051220-51320Physiological biometrics, such as fingerprints and facial features, use human morphology to identifyor recognize individuals. Besides fingerprint scanners, there are software programs that identify faces,palms, and irises. Scanning these physical features ensures that the person being scanned is who he or sheclaims to be. Unlike personal identification numbers, which are used to access bank accounts, biometricidentifiers are extremely difficult, if not impossible, for criminals to steal.Behavioral biometrics can also be used to identify people. Certain behaviors are unique to individuals,such as their speech or the way they type. The classic behavioral biometric marker is a person's signature,but it can be problematic as it can be copied. However, people do automatically recognize subtleties in theway a person speaks, such as intonation and regional accents. Typing patterns, likewise, would be verydifficult to observe and mimic convincingly.Biometrics can have two potential applications: identification and identity verification. Identificationuses biometric information to discover the identity of an unknown person. DNA evidence has joinedfingerprints as a common tool of law enforcement for this purpose. Today, we use passports to verify ouridentity when crossing borders, but passports can be stolen or forged. An effective biometric identificationsystem would be difficult to fool. Because of this, many countries are considering biometric additions toor replacements of existing identification system. India, for instance, has already implemented such asystem, which utilizes fingerprint and iris scans, in addition to photographs.While biometric identification technology shows promise in various applications, there are ethicalconcerns surrounding the development of biometric identification technology. Critics worry about thepossibility of criminal uses of the technology, as legitimate organizations can use biometric scanners toverify personal information. And civil liberties advocates are concerned about the potential for abuse byauthorities. Therefore, policymakers will need to balance security and law enforcement against personalfreedom and privacy. Ethical considerations must be taken into account when developing biometricidentification technology.
What is the main idea of this passage?
(A)The ethical problems with biometric identification.
(B)Biometric identification, its uses, and its challenges.
(C)Biometric identification and its history in law enforcement.
(D)The difference between physiological and behavioral biometrics.
According to the passage, which of the following can be scanned as a physiological biometricidentifier?
(A)Bank accounts.
(B)Brain waves.
(C)Palms and irises.
(D)Speaking speed.
According to the passage, what is a traditional behavioral biometric marker?
(A)Signatures.
(B)Facial features.
(C)Regional accents.
(D)Typing patterns.
What does the word “forged” mean?
(A)built
(B)faked
(C)missed
(D)shaped
Which ethical concern about biometric identification technology is NOT mentioned in the passage?
(A)The potential for illicit usage.
(B)The likelihood of misuse by authorities.
(C)The dispute over India's disregard for civil liberties.
(D)The balance between ensuring security and protecting personal privacy.