lawpalyer logo

人事行政 108 年中華民國憲法與英文考古題

民國 108 年(2019)人事行政「中華民國憲法與英文」考試題目,共 50 題 | 資料來源:考選部

38 題選擇題 + 12 題申論題

The six-story structure designed to replicate a residential building is the tallest building of its kind toever ____ major earthquakes. (A)recognize (B)undergo (C)request (D)unfold
Toyour level of competency in speaking a foreign language, you need to practice it every day.drop (A)violate (B)assign (C)maintain (D)
Earthquakes with _______ greater than 6 on the Richter scale will do great damages and may claimmany lives. (A)migration (B)magnitude (C)forecast (D)definition
The body reacts to high levels of mercury, which have been linked to manysuch as musclepain, hair loss, birth defects, and muscle fatigue.species (A)spectrums (B)stereotypes (C)symptoms (D)
America’s well-deserved reputation as a global leader in technology innovation is ___ from its traditionof welcoming people from other countries. (A)indigestive (B)inseparable (C)irrelevant (D)irrespective
Hundreds of monkeys arefree throughout the campus, approaching people and expecting to be fed.escorting (A)roaming (B)swamping (C)tailgating (D)
Often war causes more problems than it solves. Frequently it leaves a ______ of hate, starvation andhomelessness among the refugees it creates. (A)legacy (B)legitimacy (C)inheritance (D)heritage|90620請依下文回答第5 題至第9 題Hackers around the world are getting better at stealing passwords. A hacker is a person who uses acomputer to gain information without permission. Now, some computer scientists are trying to stophackers 5 passwords.The U.S. Military’s Defense Advanced Research Projects Agency, DARPA, is responsible for thecreation of the Internet. The agency is supporting research projects that will 6 passwords a thing ofthe past. One project is called Active Authentication. Scientists working on the project want to use aperson’s individual qualities to protect electronic devices like wireless phones against hackers. 7 , themovement of a person’s hands when they use a wireless phone can be read by sensors. The phone canremember those signs and observe them. The phone locks when someone 8 the owner tries to use it.Other teams of scientists are trying to teach computers and smart phone show to recognize a person’swriting style. The devices will know the words a person uses, 9 and the kinds of errors they make. Inanother project, the owner of a device says a phrase instead of typing a password. Sensors identify thesound and way that a user says words.DARPA says the projects have had very good results. Some of the largest computer and smart phonemanufacturers have expressed interest in using them in new devices.
Nowadays, those who possess better knowledge in technologies will have higher chance to beemployed, because their ______ in the field will help companies to meet future needs.expertise (A) (B)avoidancesurprise (C) (D)disinterest30120-30420
(A)by used not (B)by not using (C)by not used (D)by using not
About ten years ago, Roger came across theof his life; he was bankrupted, divorced and wasdiagnosed with cancer.nadir (A)novice (B) (C)influence (D)peace依下文回答第6 題至第10 題You may believe that you have forgotten the mother tongue you spoke as a child, but your brain hasn't.That “forgotten” first language may well influence
(A)offer (B)do (C)take (D)make
goes on in your brain when you speak English orJapanese today. Researchers from McGill University and the Montreal Neurological Institute describe theirdiscovery that even brief, early
(A)For example (B)By all means (C)Let alone (D)As soon as
to a language influences how the brain processes sounds from asecond language later in life -- even when the first language learned is
(A)as well as (B)other than (C)away from (D)such as
spoken. It is an importantfinding because it tells scientists not only how the brain becomes wired for language, but also how thathardwiring can change and
(A)do they make sentences (B)what they make sentences (C)how do they make sentences (D)how they make sentences請依下文回答第10 題至第14 題Stonehenge is a mysterious collection of large stones located in the south of England. Experts havemany different theories about 10 . However, since nobody really knows for sure, it has remained amystery throughout the ages. The stones themselves are very large. Some are up to five meters tall and weigh25 tons. They are arranged quite close together in a circular pattern. One of Stonehenge’s biggest mysteries ishow people without modern machinery moved those stones.Since Stonehenge is a prehistoric structure that is close to 5,000 years old, there are no records to tell usabout it. Over the centuries, many people have speculated about 11 . One theory for its purpose saysthat 12 . Ancient scientists may have used it to study events concerning the sun and the stars. There aremany people who feel that this idea is most likely. Another theory states that Stonehenge was a religious sitewhere special ceremonies were conducted. Much debate has occurred regarding these and other theories, butthe fact is that we may never know the true story.These days, Stonehenge is one of the most famous tourist sites in all of Great Britain. 13 , it attractsthousands of visitors from all over the world each year. In England, it is recognized as a national treasure andeven has special status and protection from the United Nations.14 with other sites around the world, including the pyramids of Egypt and the Great Wall of China. So,if you are planning a trip to the UK, be sure you do not miss out on one of the planet’s greatest wonders andmysteries.
over time in response to new language environments. The researchersbelieve that their findings speak to the unique and
(A)how and why Stonehenge came to be (B)where Stonehenge should be found (C)how many tourists visit Stonehenge (D)whether Stonehenge exists
influence of early language experience on laterbrain organization. The information may also be important for creating educational practices geared todifferent types of learners.6which (A)what (B)how (C)where (D)7escape (A)expulsion (B)evaluation (C)exposure (D)8no lo (A)ngerno sooner (B)frequently (C)lately (D)9adopt (A)adapt (B)adorn (C)adore (D)10pending (A) (B)farminglasting (C) (D)checking依下文回答第11 題至第15 題Communication is of basic importance within science itself. I think we would all agree that freecommunication is essential for progress in science,
(A)how large the structure of Stonehenge could be (B)what the purpose of Stonehenge might have been (C)why many wonders in the world remain undiscovered (D)why it has become an international tourist site|90620
there have been problems at the frontier withtechnology because in the world of commerce you cannot reveal everything you are doing. These frontierproblems have been
(A)Stonehenge was assembled by American scientists (B)Stonehenge was mainly built for economical reasons (C)Stonehenge was set up without high technology (D)Stonehenge was some kind of astronomical device
in recent times; in many fields, my own of molecular biology
(A)Due to the huge expense of its rennovation (B)Due to its close relation with Egyptian pyramids (C)Because of its distance from the Chinese Great Wall (D)Because of its age and the mystery surrounding it
, the oldopenness has to some extent disappeared. Some of my younger colleagues do not want to talk in public abouttheir work, because they think that if they speak about their own “secret,” somebody else will
(A)It is always recommended as a spa resort (B)It is ranked in cultural and historical significance (C)It is valued for political study (D)It is marked as the best place for a culinary trip請依下文回答第15 題至第19 題Free trade is a free market policy followed by some international markets in which governments do notrestrict imports from, or exports to, other countries. Trade treaties increase freedom to trade and do not resultin loss of sovereignty. However, most governments still impose some protectionist policies that are intendedto support local employment, such as applying tariffs to imports or subsidies to exports. Governments mayalso restrict exports of natural resources. Other trade barriers include import quotas, taxes, and non-tariffbarriers, such as regulatory legislation.Take the United States as an example. There is a growing rhetoric about imposing tariffs and limitingfreedom to trade internationally. It reflects a resurgence of old arguments that stay alive in large part becausethe benefits of free international trade are often diffuse and hard to see, while the benefits of shieldingspecific groups from foreign competition are often immediate and visible. This illusion fuels the commonperception that free trade is detrimental to the U.S. economy. It also tips the scales in favor of specialinterests seeking protection from foreign competition, which results in thousands of tariffs, quotas, and otherbarriers imposed to trade.However, restrictions on foreign trade all too often harm the very people they aim to protect, i.e.,American consumers and producers. Trade restrictions limit the choices of what Americans can buy; theyalso drive up the prices of everything from clothing and groceries to the materials manufacturers use to makeeveryday products. Lower-income Americans generally bear a disproportionate share of these costs.Not onlydo they spend more of their income on consumption goods, many of the goods they consume are subject tohigher tariffs than more expensive goods of the same type.There is a broad consensus among economists that protectionism has a negative effect on economicgrowth and economic welfare, while free trade and the reduction of trade barriers to trade has a positiveeffect on economic growth. However, they also point out that liberalization of trade can cause significant andunequally distributed losses and the economic dislocation of workers in import-competing sectors.
it andmake money out of it. Of course, this is only a partial view: science is also for the benefit of mankind. Butthe process of
Which of the following is the best title for this passage? (A)Free Trade: Better Safe than Sorry (B)Free Trade: Addressing Key Myths (C)Free Trade: Taking U.S. As an Example (D)Free Trade: Two Sides of the Same Coin
knowledge from the academic world, with its tradition of openness, to the world oftechnology and commerce does present difficulties that have still not been resolved. In my view they are veryserious problems.11even though (A)so that (B)of course (C)in fact (D)12extradited (A)exacerbated (B)executed (C)exonerated (D)13in case (A) (B)on account (C)on averagein particular (D)14 (A)expectexploit (B)expend (C)explode (D)15 (A)transmittingtransacting (B)transcending (C)transcribing (D)30120-30420依下文回答第16 題至第20 題The concept of money laundering regulations goes back to ancient times and is intertwined with thedevelopment of money and banking. Money laundering is first seen with individuals hiding wealth from thegovernment to avoid taxation or confiscation or a combination of both. Nowadays it has evolved into acomplex and highly technical process of transforming profits from illegal activities into
What is the third paragraph mainly about? (A)Consequences of trade restrictions in the U.S. (B)Protection of American consumers and producers. (C)Increasing prices of everyday products in the U.S. (D)Limited purchase choices of American consumers.
“legitimate”assets without raising the suspicion of law enforcement agencies. After money has been suitably laundered or“cleaned,” it can be used in the mainstream economy for accumulation of wealth, such as acquisitions ofproperties, or otherwise spent.Many governments around the world have become increasingly
According to the passage, which of the following statements is TRUE? (A)The benefits of free international trade are often immediate and visible. (B)Lower-income people suffer more from tariffs than higher-income people. (C)Governments may stop imposing trade barriers to limit exports of natural resources. (D)A nation's signing of free trade agreement may result in loss of its sovereignty.
in their efforts to combatmoney laundering by passing anti-money-laundering regulations. These regulations require financialinstitutions to have systems in place to detect and report suspected money-laundering activities. Accordingly,law enforcement agencies of many jurisdictions have set up sophisticated systems in an effort to detectsuspicious transactions or activities, and many have set up international cooperative arrangements to assisteach other in these
What does detrimental mean in this article? (A)Critical. (B)Harmful. (C)Manageable. (D)Temporary.|90620
.However, the use of the Internet allows money launderers to easily
Which of the following best describes the author’s attitude toward free trade? (A)Cynical and distrustful. (B)Objective and analytical. (C)Confident and committing. (D)Optimistic and encouraging.請依下文回答第20 題至第25 題A thin magnetic stripe is all that stands between Americans’ credit-card information and the bad guys.And they’ve been working hard to break in. Banks, law enforcement and technology companies are all tryingto thwart a network of hackers who are swiping account numbers, names and other crucial data used inidentity theft. More than 100 million accounts at Target, Neiman Marcus and Michaels stores were allaffected in recent attacks, starting November 2013.Cards are increasingly vulnerable to attacks in store transactions. Hackers scoop up massive troves ofcredit-, debit- or prepaid-card numbers using malware inserted surreptitiously into the retailers’ checkoutsystems. Hackers then sold the data to a second group of criminals operating in shadowy corners of the web.Not long after, the stolen data was showing up on counterfeit cards and being used for online purchases.The solution could cost as little as $2 extra for every piece of plastic issued. The fix is a securitytechnology used heavily outside the U.S. While American credit cards use the 40-year-old magstripetechnology to process transactions, much of the rest of the world uses smarter cards with the EMV (short forEuropay, MasterCard, Visa), a technology that employs a chip embedded in the card plus a customer PIN toauthenticate every transaction on the spot. If a purchaser fails to punch in the correct PIN at the checkout, thetransaction gets rejected.The cost of a magstripe card is in the dollar range. A chip-and-PIN card currently costs close to $3.Multiple $3 by 5 billion cards in circulation in the U.S. Then consider that there’s an estimated $12.4 billionin card fraud on a global basis. With 44% of that in the U.S., American credit-card fraud amounts to $5.5billion annually. Card issuers find that absorbing the liability for even big hacks like the Target one is stillcheaper than replacing all that plastic.That leaves American retailers pretty much alone the world over in relying on magstripe technology,and leaves consumers vulnerable. Ironically enough, the historical reason the U.S. has stuck with magstripe isthe once superior technology. The nation’s cheap, ultra-reliable wired networks made credit-cardauthentication over the phone frictionless. In France, card companies created EMV partly because thetelephone monopoly was so maddeningly inefficient and expensive. The workaround allowed transactions tobe verified locally and securely.
detection. The rise of onlinebanking institutions, anonymous online payment services, peer-to-peer transfers using mobile phones, andthe use of virtual currencies such as Bitcoin have made detecting the illegal transfer of money even moredifficult. Money can also be laundered through online auctions and sales, gambling websites, and even virtualgaming sites, where ill-gotten money is converted into gaming currency, then transferred back into real,usable, and
Who are the bad guys mentioned in Paragraph 1? (A)Bank robbers (B)Burglars who break into houses (C)Account hackers (D)Pickpockets who stole credit cards
“clean” money.As money launderers attempt to keep one step ahead of law enforcement, international organizationsand governments are continuing their team effort to find new ways to detect them.16considerably (A)seemingly (B)physically (C)wickedly (D)17compulsive (A)formidable (B)skeptical (C)vigilant (D)18alternatives (A)endeavors (B)incentives (C)options (D)19concede (A)prompt (B)skirt (C)terminate (D)20abnormal (A)inadequate (B)irreversible (C)untraceable (D)依下文回答第21 題至第25 題Culture is a word that everyone is familiar with, but its precise meaning can be elusive. A usefuldefinition by noted social scientist Geert Hofstede is that culture consists of shared mental programs thatcondition individuals’ responses to their environment. There are three levels involved in the mentalprograming: The deepest level--human nature--is based on common biological reactions, such as sex, drive,hunger and territoriality that all members of the human race have in common, even though they come fromdifferent cultures. The middle level--culture--is based on common experiences that we share with a particulargroup of our fellows. Cultural values, attitudes and assumptions about proper behavior give us something incommon with a definable group of others, but not with all of them. The group may be a very large one, such30120-30420as a national population, i.e. Japanese culture; or a very small one, i.e. the culture of the committee of a localparent-teacher association. The shallowest level--personality--is based on the specific genetic makeup andpersonal experiences that make each of us a unique individual. For example, we may be sociable orintroverted, aggressive or submissive, and emotional or stable. We all have many behaviors andunderstandings that are quite different from those of others, even though we come from the same culture.Culture also has the following basic characteristics. First, culture is mental programming that a grouphas in common that is not normally available to people outside the group. Second, the mental programing ofa group is learned by its members over long periods as they interact with the environment and with eachother. Third, the mental programming involved is strong. People have a hard time escaping their culture evenwhen they want to. Fourth, culture is not random as it is a system of values, attitudes, beliefs, and meaningsthat are related to each other and to the context. Last, much of culture is concealed. Besides immediatesurface behaviors, such as body language, and physical artifacts like art, culture also involves the underlyingvalues, social structures, and ways of thinking.
Which of the following may the word plastic in Paragraph 3 refer to? (A)A credit card (B)An ID card (C)A membership card (D)A report card
What is the main purpose of the passage?To explain what culture means. (A)To describe how culture may develop. (B)To explicate what values culture may have. (C)To discuss what (D)potential effects culture may exert.
According to this passage, what is the major reason why hackers steal people’s credit card data? (A)To sell them for money (B)To make counterfeit cards themselves (C)To use them as a trophy and show off (D)To use the cards for online shopping themselves
Which of the following words is closest in meaning to “concealed” in the passage?private (A)invisible (B)mystical (C)confusing (D)
Which of the following is true about EMV cards, compared with the traditional ones? (A)They cost less (B)They have a long history (C)They are easy to break in (D)They are more widely used
According to the passage, which of the following may NOT be true?The middle level of mental (A)programing is specific to groups.The deepest level of mental programing is universal and biological. (B)The shallowest level of mental programing is shared by all individuals of the same culture. (C)The surface features of individuals (D)’ behaviors are often manifestations of mental programing.
Why haven’t big banks in the U.S. adopted the more secure technology? (A)The cost for new cards is higher than the liability old cards may cause. (B)Credit-card frauds in the U.S. are pretty low, causing little liability. (C)The new technology is far from perfect, and may cause many problems. (D)Big hacks like the Target one are very rare.
According to the passage, which of the following is correct about the features of culture?Culture is largely manifest. (A)Culture is learned and enduring. (B)Culture exerts mild influence on behavior. (C)Culture is a random a (D)ssortment of customs and behaviors.
Why did France give up on magstripe technology for credit card authentication? (A)The telephone network did not cover most of France. (B)The EMV technology at that time was more advanced. (C)The phone call for credit card authentication was inefficient and costly. (D)As a tradition, France wanted a system different from that in the U.S.
According to the passage, why may it be insufficient to observe only social behaviors if one wants tofully understand cultures?Because social behaviors are transient. (A)Because social behaviors are too versatile. (B)Beca (C)use social behaviors are not observable.Because social behaviors only portray a small portion of cultures. (D)