42 Elder abuse can take on various forms, including economic exploitation, physical and emotional
abuse, as well as neglect. Sadly, those who commit elder abuse or _______ of elder abuse may be
family members.
(A) pathologists (B) pedestrians (C) perpetrators (D) prostitutes
43 The goal of airport security is to safeguard passengers, crew, and staff by _______ for forbidden items
and preventing acts of terrorism, hijacking, and other criminal activities that could endanger the
safety of air travel.
(A) bribing (B) pirating (C) conveying (D) screening
44 In that country, for sentences in excess of four years, prisoners are eligible to be released on _______ after
serving one-third of their sentences.
(A) misdemeanor (B) parole (C) dichotomy (D) penalty
45 _______ is a criminal charge involving violence, so the prosecution takes it very seriously, especially
if a weapon is involved or it results in injury.
(A) Penalty (B) Assault (C) Dissonance (D) Fracture
46 To prevent identity theft, you should regularly monitor your credit reports and financial statements
to detect any _______ or suspicious activity.
(A) credible (B) legitimate (C) impeccable (D) unauthorized
47 While driving home from a party last night, I was stopped by the police and asked to take a
breathalyzer test. Since I had only consumed orange juice at the party, my breath alcohol _______ was
normal.
(A) acceleration (B) concentration (C) disinfectant (D) intolerance
48 The government is being warned about a network of criminals carrying out a sophisticated system
of credit card _______ .
(A) treason (B) rectitude (C) fraud (D) continence
49 The court ordered the convicted woman to make _______ to the family that she had done so much
harm to.
(A) simulations (B) reparations (C) conventions (D) incursions
50 The Taiwanese government has implemented new laws that prohibit the production, sale, and
importation of e-cigarettes. The legal age for smoking has also been raised from 18 to 20 to curb
young people's _______ addiction.
(A) cocaine (B) ecstasy (C) heroin (D) nicotine
請依下文回答第 51 題至第 55 題
The Customs Administration’s canine division last year helped customs officers __51__ 758kg of
illegal drugs, which were valued at NT$330 million (US$11.86 million). Most of the narcotics detected
by sniffer dogs were ketamine, the agency said. Taiwan has 37 detection dogs, with each dog working
with one dog handler. Detection dogs are put __52__ duty whenever high-risk flights arrive, and they
must finish __53__ the luggage in about 10 minutes, it added. With the establishment of the Maritime
Express Consignments Clearance service at the Keelung Customs Office and the construction of Taiwan
Taoyuan International Airport’s Terminal 3 expected to be completed in 2026, the center said it is aiming
to expand the canine division from 37 to 44 sniffer dogs by 2025. The center said that its main task in the
next few years is to train more Labradors to find tobacco, narcotics or explosives __54__ the Military
Police Command, the National Fire Agency, the National Police Agency, the Bureau of Animal and Plant
Inspection and Quarantine, and other agencies. The success rate of training Labrador puppies to become
detection dogs has reached more than 20 percent, as puppies born from second-generation dams tend to
be stronger and healthier, it said. As the __55__ of puppies is expected to double in the next three years,
people living south of Taoyuan or north of Yunlin County are encouraged to become foster families of
puppies, the center said, adding that companies in central Taiwan can offer facilities for puppy training.
【題組】51 (A) intercept (B) intrigue (C) impact (D) imply
請依下文回答第 56 題至第 60 題
With so many people crossing borders every day, how do we know we’re not letting dangerous people
into our countries? One response is biometric identification technology. It has been developed to recognize
individuals and to identify criminals. In fact, biometric identification is not a new invention. Law
enforcement agencies have been using photographs and fingerprints as biometric identifiers since the late 19th century. Today, biometric identification technology, including both physiological and behavioral
biometrics, has become increasingly prevalent as a means of enhancing security and protecting individuals'
interests. Physiological biometrics, such as fingerprints and facial features, use human morphology to identify
or recognize individuals. Besides fingerprint scanners, there are software programs that identify faces,
palms, and irises. Scanning these physical features ensures that the person being scanned is who he or she
claims to be. Unlike personal identification numbers, which are used to access bank accounts, biometric
identifiers are extremely difficult, if not impossible, for criminals to steal.
Behavioral biometrics can also be used to identify people. Certain behaviors are unique to individuals,
such as their speech or the way they type. The classic behavioral biometric marker is a person's signature,
but it can be problematic as it can be copied. However, people do automatically recognize subtleties in the
way a person speaks, such as intonation and regional accents. Typing patterns, likewise, would be very
difficult to observe and mimic convincingly. Biometrics can have two potential applications: identification and identity verification. Identification
uses biometric information to discover the identity of an unknown person. DNA evidence has joined
fingerprints as a common tool of law enforcement for this purpose. Today, we use passports to verify our
identity when crossing borders, but passports can be stolen or forged. An effective biometric identification
system would be difficult to fool. Because of this, many countries are considering biometric additions to
or replacements of existing identification system. India, for instance, has already implemented such a
system, which utilizes fingerprint and iris scans, in addition to photographs. While biometric identification technology shows promise in various applications, there are ethical
concerns surrounding the development of biometric identification technology. Critics worry about the
possibility of criminal uses of the technology, as legitimate organizations can use biometric scanners to
verify personal information. And civil liberties advocates are concerned about the potential for abuse by
authorities. Therefore, policymakers will need to balance security and law enforcement against personal
freedom and privacy. Ethical considerations must be taken into account when developing biometric
identification technology.
【題組】56 What is the main idea of this passage?
(A) The ethical problems with biometric identification.
(B) Biometric identification, its uses, and its challenges.
(C) Biometric identification and its history in law enforcement.
(D) The difference between physiological and behavioral biometrics.
【題組】57 According to the passage, which of the following can be scanned as a physiological biometric
identifier?
(A) Bank accounts. (B) Brain waves. (C) Palms and irises. (D) Speaking speed.
【題組】58 According to the passage, what is a traditional behavioral biometric marker?
(A) Signatures. (B) Facial features. (C) Regional accents. (D) Typing patterns.
【題組】60 Which ethical concern about biometric identification technology is NOT mentioned in the passage?
(A) The potential for illicit usage.
(B) The likelihood of misuse by authorities.
(C) The dispute over India's disregard for civil liberties.
(D) The balance between ensuring security and protecting personal privacy.