信息科技英语翻译之翻译讲解实例解读
信息技术 名词解析
信息技术名词解析英文回答:Information Technology (IT)。
Information technology (IT) refers to the application of computers and telecommunications equipment to store, retrieve, transmit, and manipulate data, often in the context of a business or other enterprise.IT professionals perform a wide range of tasks, including:Designing, implementing, and maintaining computer networks.Developing and deploying software applications.Providing technical support to users.Managing data and information.Ensuring the security of IT systems.IT is essential to the functioning of modern businesses. It allows companies to automate tasks, improve communication and collaboration, and gain insights from data.Types of IT.There are many different types of IT, including:Hardware: The physical components of a computer system, such as the CPU, memory, and storage devices.Software: The instructions that tell a computer whatto do, such as operating systems and application programs.Networks: The connections that allow computers to communicate with each other.Data: The information that is stored and processed by computers.Security: The measures taken to protect IT systems from unauthorized access.IT Careers.There are many different IT careers available, including:Computer programmer: Designs, develops, and tests software applications.Network administrator: Installs, configures, and maintains computer networks.Database administrator: Manages and maintains databases.IT security analyst: Identifies and mitigates IT security risks.IT manager: Oversees the IT department of a company.IT Trends.The IT industry is constantly evolving. Some of the current trends include:Cloud computing: The delivery of computing services over the internet.Artificial intelligence (AI): The ability of computers to learn and make decisions without being explicitly programmed.Blockchain: A distributed ledger technology that is used to create secure and transparent records.Internet of Things (IoT): The network of physical devices that are connected to the internet and can collect and exchange data.中文回答:信息技术(IT)。
科技英语(电子与信息工程类)翻译
【26.As such,every new version of the product requires a redesign and trips through the foundry,an expensive proposition,and an impediment to rapid time-to-market.而且,每次推出一个新产品都需要重新设计并经历所有制造流程。
这样做不但造价昂贵,而且不利于迅速上市。
【2.Because of the very high open -loop voltage gain of the op-amp,the output is driven into positive saturation(close to+V)when the sample voltage goes slightly above the reference voltage ,and driven into negative saturation (close to -V)when the sample voltage goes slightly below the reference voltage .由于运放的开环电压增益很高,当取样电压略高于参考电压时,输出趋向于正向饱和状态(接近+V)。
当取样电压低于参考电压时,输出趋向于负向饱和状态(接近-V)。
【8.Both N-type and P-type semiconductors are made by treated materials,such as germanium and silicon with impurities such as arsenic and indium.N型半导体和P型半导体是利用杂质掺入纯净半导体而形成的,如将杂质砷和铟掺入锗和硅中。
【18.By comparison,most other forms of transmission systems convey the message information using the shape,or level of the transmitted signal;parameters that are most easily affected by the noise and attenuation introduced by the transmission path.相比之下,许多其他形式的传输系统是利用被传信号的波形或电平的高低来传送信息的,而这些参数又极易受到传输路径中的噪声和衰耗的影响。
信息科技英语翻译之翻译讲解实例解读
信息科技英语翻译之---翻译讲解 实例
• (1)The automatic assembly line can shorten the assembling period (by) ten times. (自动装 配线能够缩短装配期十分之九。) • (2) This metal is three times as light as that one. (这种金属比那种金属轻三分之二)第二种 表达方式为“n times + 减少意义的比较级”。
信息科技英语翻译之---翻译讲解 实例
•
• 2、定语从句较长,或者虽然不长,但汉译时放在被 修饰语之前实在不通顺的就后置,作为词组或分句。 这种译法叫做顺序分译法。例如:
信息科技英语翻译之---翻译讲解 实例
• (1)Each kind of atom seems to have a definite number of“hands”that it can use to hold on to others. • 每一种原子似乎都有一定数目的“手”,用来抓 牢其它原子。(顺序分译法)每一种原子似乎都有一 定数目用于抓牢其它原子的手。(逆序合译法)这句 限制性定语从句虽然不长,但用顺序分译法译出的译 文要比用逆序合译法更为通顺。
信息科技英语翻译之---翻译讲解 实例
• •
(1)All germs are invisible to the naked eye. (一切细菌都是肉眼看不见的。) • (2) Every design made by her is impossible of execution. (她所做的一切设计都是不能执行的。)
• •
如有的人把the newly developed picture tub (最新研制成功的显像管)错译为“新近被发展了画 面管”;又有人把“a unique instant-picture system”(独特的瞬时显像装置)错译为“独快的图 像系统”等等。
信息科技的英语作文带翻译
信息科技的英语作文带翻译题目,Information Technology。
信息科技。
Information technology, often abbreviated as IT, has become an integral part of modern society. It refers to the use of computers, software, networks, and other devices to store, retrieve, transmit, and manipulate data. In today's digital age, information technology plays a crucial role in various aspects of our lives, including communication, education, business, healthcare, and entertainment.信息技术,通常缩写为IT,已成为现代社会的一个不可或缺的部分。
它指的是使用计算机、软件、网络和其他设备来存储、检索、传输和操纵数据。
在今天的数字时代,信息技术在我们生活的各个方面起着至关重要的作用,包括通信、教育、商业、医疗和娱乐。
One of the most significant impacts of information technology is on communication. With the advent of theinternet, communication has become faster, easier, and more convenient than ever before. Email, instant messaging,social media platforms, and video conferencing have revolutionized the way people interact and exchange information. Distance is no longer a barrier to communication, as individuals from different parts of the world can connect in real-time through various online channels.信息技术最重要的影响之一是在通信方面。
科技英语翻译4解读
转译为状语
在英语中表示时间、原因、条件含义的主语汉译时常译作汉
语的状语,见p266.(注意此时的主语具有动词意义或与动作 相关,shortage, result, infected mother) Improved efficiency has made the products of manufactories very much cheaper than formerly. 由于效率提高,工厂里出的产品比起以前来,价格便宜多了 The collapse of the dam caused the land being flooded. 由于大坝倒塌,土地因此被淹。 Restricted movement led to an interruption of blood flow. (由于)活动受限(导致)血液流动受阻。
转译为宾语(ex-P264)
ቤተ መጻሕፍቲ ባይዱ
Several concepts are introduced: decision-making, modeling ,dynamics, feedback, stability and logical design. 这里介绍几个概念:判定、模拟、动力学、反馈、稳定性和逻辑设计等。 Provision is made within the circuitry to limit the transistor voltage. 电路已采取措施来限制晶体管的电压。 See to it that all troubles should be eliminated. 务必要排除所有故障。 No direct electrical connection to the rotor(转子)is provided. 转子没有直接的连接电线。 provision must be made for dissipating the heat that results from the sliding of surfaces. 必须采取措施驱散因表明摩擦所产生的热。 From this experiment the conclusion is drawn that the theory of oppositely charged particles attracting each other is true. 由这一实验可以得出结论,带异性电荷的粒子相互吸引的这一说法是正确的。
科技英语中一词多义及其翻译技巧
科技英语中一词多义及其翻译技巧
在科技英语中,有许多词汇存在一词多义的情况,这给翻译造成了一定的困难。
下面是一些常见的一词多义词汇及其翻译技巧:
1. Chip:
- 译为芯片或集成电路(IC)时,可直接使用chip这个词;
- 译为碎片或切屑时,可使用fragment或chip;
- 译为薯片时,可使用potato chip。
2. Driver:
- 译为驱动程序或驱动器时,可使用driver这个词;
- 译为司机或驾驶员时,可使用driver或chauffeur;
- 译为螺丝刀时,可使用screwdriver。
3. Virus:
- 译为病毒时,可直接使用virus这个词;
- 译为病原体时,可使用pathogen;
4. Mouse:
- 译为鼠标时,可使用mouse这个词;
- 译为老鼠时,可使用rat或rodent;
- 译为探测器时,可使用sensor或detector。
5. Base:
- 译为基地时,可使用base;
- 译为底座或基座时,可使用stand或base;
- 译为碱时,可使用alkali。
在翻译科技英语中,可以根据具体的上下文和语境来判断一个词的具体含义,并选取最贴切的翻译。
此外,可以通过解释附近的其他名词或动词来帮助读者理解词汇的具体含义。
在一词多义的情况下,需要根据具体的场景来选择合适的翻译,以确保翻译的准确性和流畅性。
科技英语翻译 翻译实例及分析
科技英语标题中翻英:一.语言精练,结构紧凑。
1.深部煤巷锚杆支护技术的研究与实践Research and Practice of Bolting Support Technology in Deep Coal Roadways.“......的研究与实践”论文标题的特征是精炼的语言,概括性强,没有任何的修饰词汇,准确地表达论文所涵盖的内容和研究的方向。
在翻译的过程里,也要运用最精炼的结构,才能符合原著简洁明了的风格。
2. 无约束物体动力学普适方程的变分导出Derivation of a Universal Equation for Unrestrained Bodies with Calculus of Variations.首位的”Derivation”为中心词,与原文一致;由介词”of “”for” “with “引出的短语后置,层层限定,结构紧凑,关系明了。
3. 粗晶材料缺陷的超声信号及其小波包分析Ultrasonic Signal of Defects in A Coarse-grained Material and Its Wavelet Package Analysis.翻译前必须仔细分析、准确理解中文标题,找出中心词及其修饰、限定语,理清关系。
通常,中心词出现在末尾,修饰语居其前,有时有外在标志“的”。
翻译时中心词及逻辑关系不得改变,语序则要做适当调整。
英文中修饰、限定语的位置灵活,既可在中心词之前或也可在它之后,一般有外在形式(如介词)表示其关系,所以还要考虑搭配问题。
4.汽车车轮动平衡研究Research on the Dynamic Balance of Motorcar Wheel.中文标题里过去常用的“试论”“浅谈”“体会”等表谦虚的字眼现在不太常见了,取而代之的是体现实质性内容的表达。
但有的仍免不了贯以空泛的“……的研究”,此时,标题若较长,三字可省略不译;若不长,则可照译,以便回译过来查找原文。
科技英语的翻译技巧PPT课件
.
9
词首缩略:
例: ABS= Absolute Value 绝对值
GALV= galvanometer 电流计
fax= facsimile
传真
部分缩略:
以辅音字母开头的单词,取单词的全部或部分辅音
字母,省略元音字母部分。
例: HS= Handset
手持式送话器
PZL= Puzzle Game
解谜类游戏
水泵 阀
例:water pump valve
.
18
意群组合式:
中心词之前的修饰语之间存在着比较复杂的修饰与被
修饰关系
多波段 多分点
分配
服务
例:Multi-channel Multipoint Distribution Server
动作 角色 扮演 游戏
Action Role Play Game 此外,在科技英语中普遍采取以名词为中心构成的词
antiallergenic 抗过敏的
antibacterial 抗菌的
antibody
抗体
antidote 解毒剂
antiemetic 止吐的
antifungal 抗真菌的
antihypertensive 抗高血压的
antipruritic 止痒的
antivirus (反)防病毒的
anti-yellowing 防泛黄的
bug-free 无故障
built-in 内置
close-circuit TV 闭路电视
cut-and-paste software 剪贴软件
Digital-to-Analog 数模转换器
合成词的翻译可取直译法,即将两个合成语素的词义
直译,做偏正连缀,必要时可适当增词。
信息科技英语翻译之
123
13
信息科技英语翻译之---翻译讲解 实例
• •
(1)All germs are invisible to the naked eye. (一切细菌都是肉眼看不见的。) • (2) Every design made by her is impossible of execution. (她所做的一切设计都是不能执行的。)
123
10
信息科技英语翻译之---翻译讲解 实例
• (1)All of the heat supplied to the engine is not converted into useful work的 .(并非供给热机的所 有热量都被转变为有用的功。错译:所有供给热机的 热量都没有被转变为有用的功。) • (2)Every one cannot do these tests.(并非 人人都能做这些试验。错译:每个人都的 不能做这些 试验。)
123
9
三、科技英语中部分否定句的汉译
• 在英语的否定结构中,由于习惯用法问题,其中 部分否定句所表示的意思是不能按字的 面顺序译成汉 语的,因此,翻译时要特别注意。 英语中含有全体意 义的代词和副词如all every both always altogether entirely等统称为总括词。它们用于否定结构时不是 表示全部否定,而只表示其中的一部分被否定。因此, 汉译时不能译作“一切……都不”,而应译为“并非一 切……都是的”,或“一切……不都是”。例如:
123
6
信息科技英语翻译之---翻译讲解 实例
•
• (2)“n times + as + 原级 + as + 被比较对象”,表 示“是……的n倍”。例如:Iron is almost three times as heavy as aluminum. (铁的重量几乎是铝的 三倍。)
PPT 信息科技时代的翻译
我 I
是 am
一个 a 词语对齐实例
学生 student
源短语表
短语组合表
例句:We do chicken right.
1.我们做鸡是对的。 2.我们做鸡正点耶 。 3.我们就是做鸡的,我们有做鸡的权利。 4.我们只做鸡的右半边。 5.我们可以做鸡,对吧? 6.我们行使了鸡的权利。 7.我们只做右边的鸡。 8.我们让鸡向右看齐。 9.我们只做正版的鸡! 10.只有朝右才是好鸡。 11.我们有鸡的权利! 12.只有我们可以做鸡! 13.我们“正在”做鸡好不好? 14.向右看,有鸡。 15.我们让鸡变右撇子。 16.我们一定要把鸡打成右派! 17.我们做的是“右派”的鸡!(麦当劳做的是“左派”的鸡!) 18.我们只做右撇子鸡! 19.我们干鸡的右边。 20.我们把鸡搞正!(原来是 歪的) 21.我们“躲”在鸡的右怀里。 22.我们做鸡,怎么啦 ? 23.鸡的左边留给麦当劳干。 24.我们知道怎么做鸡。 25.我们知道如何做“鸡”。 26.鸡做得对! 27.你知道我们正在做鸡。 28.我们只做正点的鸡! 29 我们烹鸡的方式最正确。/ 我们是烹鸡专家。
ห้องสมุดไป่ตู้
技术原理:
用户利用已有的原文和译文,建立起一个或多个 翻译记忆库(Translation Memory),在翻译过程 中,系统将自动搜索翻译记忆库中相同或相似的 翻译资源(如句子、段落),给出参考译文,使用 户避免无谓的重复劳动,只需专注于新内容的翻 译。翻译记忆库同时在后台不断学习和自动储存 新的译文,变得越来越“聪明”,效率越来越高。 几乎所有翻译记忆厂家都会告诉用户:有了TM,你 永远不必对同一句话翻译两遍!
• 应用:Google 的在线翻译已为人熟知,其背后的 技术即为基于统计的机器翻译方法,基本运行原 理是通过搜索大量的双语网页内容,将其作为语 料库,然后由计算机自动选取最为常见的词与词 的对应关系,最后给出翻译低主要取决于概率模型的好坏和语 料库的覆盖能力。
3-4-科技文体的翻译解析PPT课件
1. The removal of minerals from water is called softening.
从水中去除矿物质叫水软化。
2. A typical foliage leaf of a plant belonging to the dicotyledons is composed of two principal parts: blade and petiole.
2021
32
• 3. 名词化结构多 • Television is the transmission and
reception of images of moving objects by radio waves.
• 电视通过无线电波发射和接收各种活动 物体的图像。
• The heat loss can be considerably reduced by the use of firebricks round the walls of the boiler.
2021
4
Example 2
原句:We shall mention here two temperature scales, namely, the Fahrenheit scale and the Centigrade scale.
译文:这里我们将提及两种温度计:华 氏表和摄氏表。
改译:这里我们将提及两种温标:华氏 温标和摄氏温标。
进行翻译
• brain trust 智囊团
• The pupil of the eye responds to the change of light intensity
• 瞳孔可以随着光线强弱的变化放大或缩 小。
2021
科技英语翻译PPT课件
7
.
A drilled hole can be made accurate and smooth by a reamer.
reamer /ˈriːmə/
N. a steel tool with a cylindrical or tapered shank
around which longitudinal teeth are ground, used for smoothing the bores of holes accurately to size 钻孔 器; 铰床
EST Translation
2017/03/08
1
.
Contents
Translation of nouns Practice and reflections
2
.
第三章 名词和冠词的翻译
第1节 名词的译法
英语名词:普通名词、专有名词、集体名词、物 质名词和抽象名词等。
一般来说,物质名词、抽象名词和专有名词为不 可数名词,普通名词和集体名词为可数名词。
研究结果似乎表肽可以有助于控制失眠、疼痛、 和精神疾病。( 抽象名词research 后增译名词 “结果”)
Observe the resin manufacturers’recommendations about mixing and application of the resin。
关于这种树脂的混合及涂敷,请采用树脂厂商 的推荐方法。(抽象名词recommendation后增 译了名词“方法”)
根据分子理论的观点(原理、主张),物体 的温度取决于其分子的平均速度。
Effectiveness of temperature control depends upon the amount of lubricant supplied, the ambient temperature, and the external cooling.
信息安全科技英语课后汉译英英文部分
1) Initially the hacker is a skilled writing and debugging of computer programming skills, and the use of these techniques to obtain illegal or unauthorized network or file access, invasion of Intranet for the people. With a variety of powerful hacking tools are widely spread, the computer technology to understand very few people can also implement of hacker attack behavior, so the network system hacking attacks significantly increased the likelihood of.2) Active attack can cause network system status and service change. Active attacks include attempting to stop or break protection mechanism, introduce malicious code, theft or tamper with the information. Active attack may cause data disclosure and dissemination, or cause a denial of service and data tampering, including most of the unauthorized user attempts to abnormal means and the normal means of access to the remote host.3) General complete attack process is to hide themselves, hiding yourself after the attack detection, detection of target machines with various properties, and have been attack condition; then take corresponding attack methods were destroyed, achieve his goal after the attacker will remove their behavior in the target system log.4) General complete attack process is to hide themselves, hiding yourself after the attack detection, detection of target machines with various properties, and have been attack condition; then take corresponding attack methods were destroyed, achieve his goal after the attacker will remove their behavior in the target system log.5) Denial of service attack, is through illegal monopoly target system services, ultimately trying to prevent legitimate users target to provide network services. Denial of service attack is the most common attack through the resulting in a large number of flows to the victim network packet, the network consume all available bandwidth.6) Modern cryptography is one of the basic principles are: all secrets are present and the key. The implication is that, in the design of encryption system, always assume the cipher algorithm is disclosed, really need to keep it secret. This is because the cipher algorithm is easier to reveal the relative key.7) Symmetric cipher password required to achieve through the security code channel by sender to receiver. The password system 's advantages are: high safety, fast encryption speed. The shortcoming is: with the expansion of network scale, key management becomes a difficulty;cannot solve the message confirmation problems; lack of automatic detection of key leakage ability.8) Cryptographic protocol has the following characteristics: agreement from first to last is a sequential process, every step must be performed, in the former step without prior to implementation, the following steps are not possible; protocol requires at least two participants; the protocol must be able to complete a certain task; protocol must meet certain security requirements.9) As a result of cryptography for communication to provide strong security, the attacker has turned to loopholes in the system. Loopholes in the system is a software system, network protocols such as in the preparation of safe flaw, the attacker can use these flaw carries on the attack to the system. For this type of attack, there are a variety of different coping techniques, and cryptography has to a certain extent, can play a role in.10) Public key cryptography is also known as asymmetric key cipher. Using public key cryptography each user separately has two key: encryption keys and decryption key, both of them are not the same, and the encryption key decryption keys on the computer is not feasible. Each user's encryption key are open (and hence, also known as the public key encryption key ).11) If the Internet and are accessed through the firewall, then the firewall, can record various visits, and provides information about network utilization value statistics. If a firewall in suspicious activity occurred when the alarm, it also provides the firewall and network are affected by the trial or attack details.12) The present firewall values are provided on external network user attack protection, from the internal network users to attack to rely on internal network host system by. The firewall can't forbid apostates or company spy sensitive data is copied to a floppy disk or PCMCIA card, and took them out of the company.13) The firewall can prevent data driven attack. If the user is graspinga program on the local operation, the program is likely to include a malicious code. With the Java, JavaScript and ActiveX controls a large number of use, this problem becomes more and more sharp.14) Packet filtering technology, as the name suggests is in proper position on the network data packets carried out selectively by, selectionbasis, namely system within a set of filter rules ( often referred to as the access control list -- Access Control List ), only to meet the data packet filtering rules to be forwarded to the corresponding network interface, the remaining data package is removed from the data stream.15) D ifferent types of firewalls are able to provide identification and authentication functions, the network user is usually considered credible, outside the network of users in access network resources are usually certified. Password authentication from the technical point of view, is not a very strong authentication, password based attack is a common attack, firewall, other filter access authentication method: one time password, the password based on time and challenge response scheme.16) I ntrusion detection is the rational supplement of the firewall, the help system against network attack, expanded the safe management of system administrator ( including safe audit, surveillance, attack recognition and response), improve the integrity of the information security foundation structure. It is thought to be behind a firewall second security gate, without affecting the performance of network condition on the network can be detected, thereby providing for internal attacks, external attack and wrong operation real time protection.17) I ntrusion detection, Intrusion Detection, is on the intrusion behavior found, through the computer network or computer systems in a number of key point of collecting and analyzing the information, found from the network or system of violating security policy behavior and signs of attack.18) The IDS system 's two major functions: real-time detection and safety audit. Real time detection of real-time monitoring, analysis of the network of all data packets, and real-time processing of the captured data packets; security audit based on IDS system records the network time for statistical analysis, found that the abnormal phenomenon, that the security state of the system, find out the evidence required.19) Most of the traditional intrusion detection system ( IDS ) take based on network or host based approach to identify and avoid attack. In either case, the product will be looking for" the attack flag", i.e. a malicious or questionable intent to attack mode. When the IDS in the network to find these patterns, it is based on the network. And when the IDS in a record file for the attack when the mark, which is based on host.20) Based on sentence due to IDS (HIDS) using data is the main source of audit log, system log, application logs and network connection data, these data have the success / failure event information, so it can becompared based on network IDS more accurately determine whether the attack was successful.21) IEFE based on IP draft definition VPN: using IP mechanism simulation of a private network, through private tunnel in public data network technology in simulation of a point-to-point line technology. Virtual private network is to rely on the ISP ( Internet service provider ) and other network service provider, in a public network for data communication network technology.22) VPN also made up of 3 components, different VPN connection using a tunnel as a transmission channel, the tunnel is built in a public network or a private network on the basis of, such as Internet or Intranet, users no longer need to have special long-distance data line.23) Security is one of the important features of the special network. Because VPN directly built on the public network, the realization of a simple, convenient and flexible, but at the same time, the security problem is more prominent. The enterprise must make sure that the VPN transmitted data are not the attacker snoops and tamper with, and to prevent the illegal user from cyber source or private information access. ExtranetVPN enterprise network expansion to partners and customers, for the safety of a higher demand.24) VPN requires the enterprise of its network management functions from the local area network seamlessly extends to the public network, or even customers and partners, although can be some minor network management task to the service provider to complete, enterprises still need to accomplish many tasks of network management, so, the VPN system should support the user management. The VPN management including safety management, equipment management, configuration management, access control list management, QoS management, to achieve reduced network risk, with high scalability, economy, high reliability target.25) VPN through the public network to establish links, so it is necessary to use encryption to prevent eavesdropping, protection of corporate data security. Common encryption algorithm including DES,3DES etc.. DES key length of 56 bits, easily deciphered, 3DES uses three encryption of increased safety.26) Computer virus epidemic began in November 2, 1988. The United States Cornell University 23 years of graduate Lott Maurice produced a worm, and putting it on the Internet to the United States, resulting in the computer network of more than 6000 computers were infected, manynetworked computers to shutdown, the direct economic losses of $96000000.27) A computer virus is a small program, able to replicate themselves, will own the virus code attached to other procedures, through the execution of other programs, for the propagation of the virus program, have a certain latency, when conditions are ripe, they are all sorts of sabotage, the effects of computer use.28) Now popular virus is composed of that deliberately prepared, most viruses can be found on the author information and the origin of information, through the analysis of large volumes of data statistics, virus author main condition and objective is: some talented programmer to show and prove their ability, due to the dissatisfaction of boss, for the curious, in retaliation, in order to congratulate and courtship, in order to get control of the password, to prevent software to get paid for the trap.29) Hybrid virus is not a simple file type virus and boot viruses simply added together, there is a conversion process, which is the most key. Generally take the gimmick: files for viruses when performing the virus writes the boot area, it is easy to understand.30) The computer virus is an objective existence, objective existence has its characteristics, computer virus is no exception. Essentially, a computer virus is a program code, although it may well hidden, but also left many traces. Through to these traces of discrimination, we can find the computer virus in the presence of.。
科技英汉篇章翻译
科技英汉篇章翻译的重要性
促进科技交流
科技英汉篇章翻译是国际间科技交流的重要桥梁,有助于不同国家和地区的科研人员、企业和政府机构之间传递科技 成果、分享技术信息和经验。
推动科技进步
通过科技英汉篇章翻译,科学家和工程师可以快速获取国际前沿的科技进展和研究成果,从而推动本国科技进步和创 新。
促进经济发展
详细描述
在科技英汉篇章翻译中,准确选择词汇至关重要。译者应充分理解原文含义,并选择符 合语境的词汇进行翻译。对于专业术语和特定表达,需查阅相关资料或咨询专业人士,
以确保准确传达原文语义。
句式转换与调整
总结词
灵活调整句式,符合中文表达习惯
VS
详细描述
在科技英汉篇章翻译中,由于英汉两种语 言的句法结构存在差异,需要进行适当的 句式转换与调整。译者需根据中文的表达 习惯和语法规则,对原文的句子结构进行 合理调整,使译文更加流畅自然。
THANKS
感谢观看
案例五:环境科学领域的英汉翻译
总结词
环境科学领域的英汉翻译需要注重专业性和 准确性,同时关注环境保护和可持续发展。
详细描述
环境科学领域涉及大量环境保护、可持续发 展等方面的内容,要求译者具备深厚的环境 科学知识背景。在翻译过程中,译者需要准 确理解原文含义,并选择恰当的词汇和表达 方式进行翻译。同时,还需要关注环境保护 和可持续发展的主题,确保译文符合相关理 念和目标。
发展趋势
随着全球化和信息技术的快速发展,科技英汉篇章翻译的需求不断增长。未来,随着人工智能和机器翻译技术的 进步,科技英汉篇章翻译将更加高效、准确和便捷。同时,对于译者的专业素养和跨文化交流能力的要求也将进 一步提高。
02
科技英汉篇章翻译的技巧与策略
科技英语翻译实例
一、科技术语的汉译术语是表示某一专门概念的词语,科技术语就是在科技方面表示某一专门概念的词语。
因此翻译时要十分注意,不能疏忽。
英语科技术语的特点是词义繁多,专业性强,翻译时必须根据专业内容谨慎处理,稍不注意就会造成很大的错误。
如有的人把the newly developed picture tub(最新研制成功的显像管)错译为“新近被发展了画面管”;又有人把“a unique instant-picture system”(独特的瞬时显像装置)错译为“独快的图像系统”等等。
再以"cassette"这个术语为例,它除了其他方面的意思之外,在录音磁带方面也还有两个意思:一为“装填式磁带盒”,一为“盒式磁带”。
究竟应译为那个意思,要从上下文的具体意思去分析判断。
如进口的收录两用机的使用说明书上有“checking the cassette”和“to insert cassette”两个小标题,究竟应当怎么译呢?看来分别将其的译为“检查盒式磁带”和“装上盒式磁带”,要比分别译为“检查磁带盒”和“装上磁带盒”更好一些。
二、科技英语中倍数增减(包括比较)的汉译1、倍数增加的译法英语中说“增加了多少倍”,都是连基数也包括在内的,是表示增加后的结果;而在汉语里所谓“增加了多少倍”,则只表示纯粹增加的数量。
所以英语里凡是表示倍数增加的句型,汉译时都可译成“是……的几倍”,或“比……增加(n-1)倍”。
为了便于查阅,现将英语中表示倍数增加的一些表达法及其译法归纳如下:例如:a The production of various stereo recorders has been increased four times as against 1977.(各种立体声录音机的产量比1977年增加了三倍。
)b The output of color television receivers increased by a factor of 3 last year.(去年彩色电视接收机的产量增加了二倍。
信息科技的英文单词及句子摘抄
信息科技的英文单词及句子摘抄信息科技的英文单词及句子摘抄信息科技的英文:information technology参考例句:Innovations in information technology, especially the Internet, continually provide us with new channels of information.信息科技创新,特别是互联网的应用,不停地为我们提供新的信息渠道。
information是什么意思:n. 消息;资料;通知Informed judgement.有事实根据的判断。
This is an informal expression.这是一种非正式表达法。
This is an informal word.这是一种口语用语。
Server InformationSpecify the roaming access server information服务器信息指定漫游访问服务器的信息The informant is expected to provide the information about the deceased 希望义务报告人提供关于死者的'情况。
technology是什么意思:n. 技术,科技;技术应用This is the centre of the technology.这是这项技术的核心。
Technology Department is responsible for the overall planning of technology.技术部负责按体系要求做好技术的总体策划工作。
HTTC HyperTransport Technology ConsortiumHyperTransport技术协会 DHT Dolby Headphone Technology 杜比耳机技术technology for producing icecream with soybean用大豆生产冰淇淋技术。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
信息科技英语翻译之---翻译讲解 实例
•
• (3)Both instruments are not precise.(两台仪器 并不都是精密的。错译:两台仪器都不是精密的。)
信息科技英语翻译之---翻译讲解 实例
• (4)This plant does not always make such machine tools.(这个工厂并不总是制造这样的机床。 错译:这个工厂总是不制造这样的机床。) 但是当 (这些总括词 + 肯定式谓语 + 含否定意义的单词……) 时,则是表示全部否。例如:
三、科技英语中部分否定句的汉译
• 在英语的否定结构中,由于习惯用法问题,其中 部分否定句所表示的意思是不能按字的 面顺序译成汉 语的,因此,翻译时要特别注意。 英语中含有全体意 义的代词和副词如all every both always altogether entirely等统称为总括词。它们用于否定结构时不是 表示全部否定,而只表示其中的一部分被否定。因此, 汉译时不能译作“一切……都不”,而应译为“并非一 切……都是的”,或“一切……不都是”。例如:
• •
如有的人把the newly developed picture tub (最新研制成功的显像管)错译为“新近被发展了画 面管”;又有人把“a unique instant-picture system”(独特的瞬时显像装置)错译为“独快的图 像系统”等等。
二、科技英语中倍数增减(包括比较) 的汉译
信息科技英语翻译之---翻译讲解实例
•
一、科技术语的汉译 • 术语是表示某一专门概念的词语,科技术 语就是在科技方面表示某一专门概念的词语。 因此翻译时要十分注意,不能疏忽。英语科技 术语的特点是词义繁多,专业性强,翻译时必 须根据专业内容谨慎处理,稍不注意就会造成 很大的错误。
信息科技英语翻译之 --翻译讲解实例
英语中一切表示倍数减少的句型,汉译时都要把 它换成分数,而不能按照字面意义将其译成减少了多 少倍。因为汉语是不用这种表达方式的,所以应当把 它译成减少了几分之几,或减少到几分之几。我们所 说的增减多少,指的都是差额,差额应当是以原来的 数量为标准,而不能以减少后的数量作标准。英语表 示倍数减少时第一种表达方式为:“…… + 减少意义 的谓语 + by a factor o的 f n或by n times”。这种表 达法的意思是“成n倍地减少”,即减少前的数量为 减少后的数。
信息科技英语翻译之---翻译讲解 实例
•
• (2)“n times + as + 原级 + as + 被比较对象”,表 示“是……的n倍”。例如:Iron is almost three times as heavy as aluminum. (铁的重量几乎是铝的 三倍。)
3、倍数减少的译法
•பைடு நூலகம்•
• 1、倍数增加的译法 • 英语中说“增加了多少倍”,都是连基数也包括 在内的,是表示增加后的结果;而在汉语里所谓“增 加了多少倍”,则只表示纯粹增加的数量。所以英语 里凡是表示倍数增加的句型,汉译时都可译成“是…… 的几倍”,或“比……增加(n-1)倍”。为了便于查 阅,现将英语中表示倍数增加的一些表达法及其译法 归纳如下:
信息科技英语翻译之---翻译讲解 实例
• (1)All of the heat supplied to the engine is not converted into useful work的 .(并非供给热机的所 有热量都被转变为有用的功。错译:所有供给热机的 热量都没有被转变为有用的功。) • (2)Every one cannot do these tests.(并非 人人都能做这些试验。错译:每个人都的 不能做这些 试验。)
2、倍数比较的译法
• (1)“n times + larger than + 被比较对象”,表示 其大小“为……的n倍”,或“的 比……大n-1倍”。例 如:This thermal power plant is four times larger than that one. (这个热电站比那个热电站大三倍。) 这是因为英语在倍数比较的表达上,其传统习惯是 larger than等于as large as,因此汉译时不能只从字 面上理解,将其译为“比……大n倍”,而应将其译为 “是……的n的 倍”,或“比……大n-1倍”。
信息科技英语翻译之---翻译讲解 实例
• (1)The automatic assembly line can shorten the assembling period (by) ten times. (自动装 配线能够缩短装配期十分之九。) • (2) This metal is three times as light as that one. (这种金属比那种金属轻三分之二)第二种 表达方式为“n times + 减少意义的比较级”。
信息科技英语翻译之 --翻译讲解实例
•
• 例如: • a The production of various stereo recorders has been increased four times as against 1977. (各种立体声录音机的产量比1977年增加了三倍。) • b The output of color television receivers increased by a factor of 3 last year.(去年彩色电 视接收机的产量增加了二倍。)
信息科技英语翻译之---翻译讲解 实例
• • •
应当指出,有些书认为by后面的倍数是净增加的 倍数,汉译时应译为“净增加多少倍的 ”,而不该减 一倍。本人认为这种译法未必妥当,因为“by n times”的意思是“用n数乘”。如15 increased by 5 times是15×5 = 75之意,75与15相比显然是增加了 四倍,而不是五倍。
信息科技英语翻译之---翻译讲解 实例
• •