Documente Academic
Documente Profesional
Documente Cultură
INFORMTICOS (INGLS-ESPAOL)
languages. One has to be careful with metaphoric language since it tends to be more
language-specific than universal. Note the passive structure in line 2 of the English
text and how it is translated using the equivalent structure in Spanish (are storedestn almacenados). The complex preposition into is translated as hasta ser which is
a totally different form. However, it perfectly captures the sense conveyed in the
English text. Also note the use of the phrase de forma creciente which does not have
a parallel in the English text, but its meaning is dictated by context.
SAMPLE TWO
Web pages are stored on web servers located around the globe. Entering the Uniform
Resource Locator or URL of a web page in your web browser or clicking a link sends a
request to the server that hosts the content. The server transmits the web page data to
your computer and your web browser assembles it on your screen.
TRANSLATION
Las pginas Web estn almacenadas en servidores web situados por todo el mundo. Al
introducir en el explorador de web la URL (siglas del ingls Uniform Resource Locator,
en espaol un Localizador Uniforme de Recursos) de una pgina web, o al hacer clic
en un vnculo, una peticin es enviada al servidor que alberga la pgina. El servidor
enva la pgina web a su ordenador y su explorador de web la muestra en su pantalla.
COMMENTS
The treatment of the technical abbreviation in line 2 of the English text (URL) is worth
highlighting. The translator states first what the abbreviation stands for in English,
then he or she provides the equivalent words in Spanish. In this respect, the
translator helps the reader even understand English terminology. The Spanish text
uses the formal polite pronoun su although this does not have a direct lexical
equivalent in the English text.
su rather than
translator feels that the formal pronoun is the default one in Spanish computerrelated texts, especially that the reference of the pronoun is not specific. It is also
known that English in general tends to be more on the informal side. Note also the
difference in word order between the English and the Spanish texts.
SAMPLE THREE
A web page (such as the one you are looking at now) is an electronic document written
in a computer language called HTML (Hypertext Markup Language). Web pages can
contain text, graphics, audio, video, and animation, as well as interactive features,
such as data entry forms and games. Each page has a unique address known as a
URL (Uniform Resource Locator), which identifies its location on the network. Web
pages usually contain hyperlinks to other web pages or resources. Hyperlinks are text
and images that reference the addresses of other web pages.
TRANSLATION
Una pgina web (como la que est viendo ahora) es un documento electrnico escrito
en un lenguaje de computador llamado HTML (siglas del ingls Hypertext Markup
Language, o Lenguaje de Marcacin de Hipertexto, en espaol). Las pginas Web
pueden contener texto, grficos, vdeo, animaciones, y sonido, as como elementos
interactivos, como formularios de entrada de datos. Cada pgina tiene una direccin
nica que se denomina una URL (del ingls Uniform Resource Locator, en espaol
Localizador Uniforme de Recursos), que identifica su ubicacin en el servidor. Las
pginas Web contienen generalmente hipervnculos a otras pginas web. Los
hipervnculos son textos e imgenes que hacen referencia a URLs de otras pginas
web.
COMMENTS
The English linking phrase as well as in line 3 is appropriately matched with the
Spanish as como while the item such as is provided with the translation como
which is also fitting here. It is quite interesting that the word addresses towards the
end of the English text is translated as URLs in Spanish. This demonstrates that the
translator has IT and computer knowledge. In some other texts or due to lack of such
knowledge, the word would have been translated as domicilios. Note how the
translator has used the Spanish word contienen to translate the English word
contain in line 5 of the English text. The translator could have used tienen. He or
she has to decide about the best equivalent, and the more synonyms there are, the
more difficult his or her job becomes.
SAMPLE FOUR
A website consists of one or more web pages that relate to a common theme, such as a
person,
business,
organization,
or
subject,
such
as
news
or
sports.
The first page is called the home page, which acts like an index, indicating the
content on the site. From the home page, you can click links to access other pages on
the site or other resources on the Web
TRANSLATION
Un sitio web se compone de una o ms pginas web referidas a un asunto comn,
como a una persona, un negocio, una organizacin o a un tema, tal como el deporte.
La primera pgina se llama la pgina de inicio, y hace las funciones de un ndice,
indicando el contenido del sitio. En la pgina de inicio puede hacer clic en los
hipervnculos para acceder a otras pginas web.
COMMENTS
Note how the translator has used the word asunto to translate theme in line 1 of
the English text. Falling into the trap of false friends. Some other translator would
have used the word tema , which is correctly used to translate the word subject in
line 2 of the English text. Note how the English such as in line 2 is translated here
as tal como and NOT as como as we see in SAMPLE
how
the
context
is
of
utmost
THREE.
importance.
Now,
This
shows
interestingly,
the
translator has NOT translated the word news in line 2. Perhaps, since it is simply a
list of examples, the translator has felt that dropping one word would not hurt.
However, one can argue that this would mean that one is not totally faithful to the
source text where the word news DOES exist indeed. This is definitely a question to
debate.
SAMPLE FIVE
Electronic mail, or e-mail, is the most frequently used service on the Internet for many
reasons:
Send a message anytime, anywhere and the recipient can read it at his or her
convenience. Send the same message to multiple recipients.
Send messages around the world as easily as to someone down the block.
TRANSLATION
El correo electrnico, o e-mail, es el servicio utilizado con ms frecuencia en Internet,
por muchas razones:
Puede enviar mensajes a cualquier parte del mundo tan fcilmente como a
compaeros de trabajo de la oficina de al lado.
COMMENTS
The English adverbial phrase most frequently in line 1 is translated using the
Spanish prepositional phrase con ms frecuencia, which shows how the priority of
the translator is to convey the meaning of the source text using the same grammatical
structure or a different one. Grammar for the translator is a means to achieve an end,
and not the end itself. Grammar is at the service of the translator to find the best way
to express the semantic
content
of
the
source
text. Furthermore,
The metaphoric expression down the block at the end of the English text has
been translated using a different item. What
the
English
expression
means
is
TRANSLATION
No hay garantas de privacidad del correo electrnico. Un mensaje puede ser
interceptado y ledo mientras va camino de su destino final a travs de Internet.
Considere el correo electrnico como si fuera una postal. Para enviar informacin
delicada o confidencial va correo electrnico, utilice software de cifrado o encriptacin.
Algunas compaas consideran el correo electrnico equivalente al correo en papel, y
se reservan el derecho a archivar y revisar su correspondencia electrnica. Cuando
borra un mensaje de su ordenador, una copia de ste an puede permanecer en el
servidor de correo.
SAMPLE SEVEN
To improve the impact of your messages and avoid trouble, there are a few unwritten
rules, called netiquette (networking etiquette) you should be aware of:
-
Keep your messages short and focused. Recipients tend to ignore long messages
-
Don't write in all CAPITAL LETTERS. Capital letters are used for emphasis, and
are considered equivalent to SHOUTING. IT'S ALSO DIFFICULT TO READ.
Don't write anything you wouldn't say in public. It's easy for recipients to
forward messages to others, which could leave you in an embarrassing position
if you divulge personal or confidential information.
TRANSLATION
Para mejorar la impresin causada por sus mensajes, y evitar problemas, hay algunas
reglas no escritas, denominadas de netiqueta (net + etiqueta; "net" es "red" en ingls)
que debe conocer:
-
En sus mensajes sea breve y centrado. Los destinatarios tienden a ignorar los
mensajes largos.
No escriba nada que no dira en pblico. Es fcil para los destinatarios reenviar
sus mensajes a otros, lo que puede dejarle en una posicin incmoda en caso
de que divulgara en ellos informacin personal o confidencial.
SAMPLE EIGHT
Like a postal address, an e-mail address specifies the destination of an electronic
message.
The domain name is the address. Many people can share the same domain
name.
TRANSLATION
Igual que una direccin postal, una direccin de correo electrnico especifica el
destino de un mensaje electrnico.
SAMPLE NINE
In addition to sending text messages, most e-mail programs allow you to attach word
processing documents, spreadsheets, graphics, audio, video, and other electronic files
to your message. To attach a file:
Click the Attachment or Include File icon, often represented by a paper clip.
This feature is often located on the toolbar or on a pull-down menu.
Locate the file on your computer's hard drive or other storage device from the
window
that
opens
requesting
the
name
of
the
file.
Select the file you want from the file attachment window. An icon representing
the file may appear in the body of your message, or the name of the file
appears in the Attachment line of your message window.
TRANSLATION
Adems de enviar mensajes de texto, muchos programas de correo electrnico le
permiten adjuntar a sus mensajes documentos de procesadores de texto, hojas de
clculo, grficos, audio, vdeo y otros archivos electrnicos. Para adjuntar un archivo:
en
un
men
desplegable.
de
almacenamiento.
SAMPLE TEN
The most useful buttons on your browser toolbar include:
-
Home -- Takes you to the start page specified in the browser preferences.
Reload or Refresh -- Downloads the web page from the server again.
Print -- Lets you make a hard copy of the current page displayed in your
browser.
TRANSLATION
Entre los botones ms tiles de la barra de herramientas de su explorador estn:
Textos Obligatorios
TEXT ONE
Obligatory-Obligatorio
LAPTOP OR DESKTOP
Choosing between a laptop and desktop can be a difficult decision. The bottom line
comes down to portability. If you will need or use the portability of a laptop, then it
can be a powerful tool for you and worth the extra money. However, if the laptop will
simply act as a desktop with very occasional need for portability, a desktop is also an
excellent choice and far less expensive.
Laptops have a great advantage in terms of their portability. If you carry a laptop with
you, your applications and documents are always immediately available. With a
wireless card, your laptop can also access the Internet while on the go, so you have
more places to do research, check your email, and be more productive.
Desktops offer other advantages. Although laptop prices have come down and
performance has increased, most desktops offer a better price-to-performance ratio.
Desktops also still hold some ergonomic advantages over laptops. Bear in mind that,
aside from small footprint desktops like the iMac or Studio One, they take up more
space in an apartment or residence hall.
A typical laptop weighs between 4.5 and 8 pounds. Alternatively, the economy and
cost-oriented option - the netbook- focuses primarily on mobility and are often
Windows or Linux-based. Netbooks are most commonly equipped with an Intel Atom a series of microprocessor that focuses less on performance and more on basic
functionality in tandem with low power consumption.
Adapted from http://helpdesk.wisc.edu/showroom/page.php?id=3044
TEXTO TWO
Obligatory-Obligatorio
HOW TO INSTALL RAM
1. Determine what kind of RAM you need, and whether your computer has enough
open slots to hold it. The new RAM should match the existing RAM's
specifications and configuration.
2. Shut down the computer and leave it plugged into the surge suppressor.
3. Disconnect all peripheral devices, such as the monitor, from the computer.
4. Remove the computer cover.
5. Ground yourself to the computer with professional grounding equipment like an
anti-static wristband or hold a metal part of the chassis.
6. Remove any cards or internal components necessary to give yourself
unobstructed access to RAM sockets.
7. Pick up your SIMM (single in-line memory module) or DIMM (dual in-line
memory module) by the ends without touching pins or chips.
8. If adding a SIMM, find the notched end and turn the SIMM so that it is parallel
to the existing RAM card(s). Insert the SIMM into the socket at a 30-degree
angle.
9. Use slight pressure to keep a SIMM from backing out while rotating the module
to an upright position perpendicular to the motherboard.
10. Make sure the small holes on each side of a SIMM fit into holders.
Adapted from: http://www.ehow.com/how_895_install-ram.html
TEXT THREE
Obligatory-Obligatorio
WHAT IS A VIRUS
In computers, a virus is a program that replicates by being copied or initiating its
copying to another program or document. Viruses can be transmitted as attachments
to an e-mail note or in a downloaded file, or be present on a diskette or CD. The
immediate source of the e-mail note, downloaded file, or diskette you have received is
usually unaware that it contains a virus. Some viruses wreak their effect as soon as
their code is executed; other viruses lie dormant until circumstances cause their code
to be executed by the computer. Some viruses are benign or playful in intent and
effect while some can be quite harmful, erasing data or causing your hard disk to
require reformatting. A virus that replicates itself by resending itself as an e-mail
attachment is known as worm.
Generally, there are three main classes of viruses. The first is the File infectors. Some
file infector viruses attach themselves to program files. Some can infect any program
for which execution is requested. When the program is loaded, the virus is loaded as
well. Other file infector viruses arrive as wholly-contained programs or scripts sent as
an attachment to an e-mail note.
The second is System or boot-record infectors. These viruses infect executable code
found in certain system areas on a disk. A typical scenario is to receive a diskette from
an innocent source that contains a boot disk virus. When your operating system is
running, files on the diskette can be read without triggering the boot disk virus.
However, if you leave the diskette in the drive, and then turn the computer off or
reload the operating system, the computer will look first in your A drive, find the
diskette with its boot disk virus, load it, and make it temporarily impossible to use
your hard disk.
Adapted from
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html
TEXT FOUR
Obligatory-Obligatorio
PERSONAL COMPUTERS
A personal computer is a small, relatively inexpensive computer designed for an
individual user. All are based on the microprocessor technology that enables
manufacturers to put an entire CPU on one chip. Businesses use personal computers
for word processing, accounting, desktop publishing, and for running spreadsheet and
database management applications. At home, the most popular use for personal
computers is for playing games.
Personal computers first appeared in the late 1970s. One of the first and most popular
personal computers was the Apple II, introduced in 1977 by Apple Computer. During
the late 1970s and early 1980s, new models and competing operating systems seemed
to appear daily. Then, in 1981, IBM entered the fray with its first personal computer,
known as the IBM PC. The IBM PC quickly became the personal computer of choice,
and most other personal computer manufacturers fell by the wayside. One of the few
companies to survive IBM's onslaught was Apple Computer, which remains a major
player in the personal computer marketplace.
Other companies adjusted to IBM's dominance by building IBM clones, computers
that were internally almost the same as the IBM PC, but that cost less. Because IBM
clones used the same microprocessors as IBM PCs, they were capable of running the
same software. Over the years, IBM has lost much of its influence in directing the
evolution of PCs. Many of its innovations, such as the MCA expansion bus and the
OS/2 operating system, have not been accepted by the industry or the marketplace.
Adapted from
http://webopedia.internet.com/TERM/P/personal_computer.html
TEXT FIVE
Obligatory-Obligatorio
THE INTERNET
The Internet, in simplest terms, is the large group of millions of computers around the
world that are all connected to one another. These computers are connected by phone
lines, fiber optic lines, cable, satellites, and wireless connections.
When you log on to the Internet you are given access to many of the other computers
that are connected around the world. Some common ways of connecting to the
Internet include are Internet service provider (ISP) by modem, Internet ready cable,
digital subscriber line (DSL), and simply turning on your computer which is on a
network at work or school connected to the Internet
The Internet works a lot like a postal or parcel delivery system, except it is much,
much faster. Say, for example, you are in California and want to send an e-mail to a
friend in London. After you press the send button, your e-mail goes to your mail
server. The mail server will attempt to contact your friend's mail server in London. But
chances are your mail server doesn't have a direct line connecting it to your friend's
mail server in London. Your mail server may have to "talk" to a computer in Chicago,
which then takes to a computer in Washington, D.C., which contacts the London
server via satellite.
Adapted from: http://www.davesite.com/webstation/inet101/net01.shtml
TEXT SIX
Obligatory-Obligatorio
SPAM
Spam is flooding the Internet with many copies of the same message in an attempt to
force the message on people who would not otherwise choose to receive it. Most spam
is commercial advertising, often for dubious products, get-rich-quick schemes, or
quasi-legal services. Spam costs the sender very little to send -- most of the costs are
paid for by the recipient or the carriers rather than by the sender.
There are two main types of spam, and they have different effects on Internet users.
Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups.
(Through long experience, Usenet users have found that any message posted to so
many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed
at "lurkers", people who read newsgroups but rarely or never post and give their
address away. Usenet spam robs users of the utility of the newsgroups by
overwhelming them with a barrage of advertising or other irrelevant posts.
Furthermore, Usenet spam subverts the ability of system administrators and owners
to manage the topics they accept on their systems.
Email spam targets individual users with direct mail messages. Email spam lists are
often created by scanning Usenet postings, stealing Internet mailing lists, or searching
the Web for addresses. Email spams typically cost users money out-of-pocket to
receive. Many people - anyone with measured phone service - read or receive their
mail while the meter is running, so to speak.
Adapted from
http://spam.abuse.net/overview/whatisspam.shtml
TEXT SEVEN
Obligatory-Obligatorio
SPEED: CPU AND MEMORY
The CPU is the brain of the computer. Its job is to take information from the various
input devices, the operating system, and software and execute the instructions that it
has been given. A CPU executes a certain amount of instructions within a grouping
called a cycle. The speed of the CPU is measured in how many cycles it can perform in
a given second. A speed of one cycle per second is called a hertz. Therefore, a CPU that
has a frequency of 1 million cycles per second has the speed of a Megahertz, and a
CPU that has a frequency of 1 billion cycles per second is a Gigahertz.
Just as important to the speed of the CPU is the amount of memory you have in your
computer. Memory is the temporary storage place for your computers information.
When a computer is manipulating some sort of information, it is placed in the memory
to be retrieved or manipulated later. If all your usable memory gets filled up, the
computer will then start storing temporary data on to your hard drive in something
called a swap file. When the CPU is ready to use that information it will then read it
back from your hard drive and place it into memory where it can be used.
As you can see when you use a swap file, and the CPU needs to access the data. It
becomes a two-step process in retrieving that data from the hard drive and memory,
instead of a one step process of reading the data directly from memory.
Adapted from
http://www.bleepingcomputer.com/tutorials/tutorial30.html
TEXT EIGHT
Obligatory-Obligatorio
INSTRUCTIONS TO INSTALL THE WINDOWS 7 BETA
Adapted from
http://www.microsoft.com/australia/windows/windows-7/beta-installationinstructions.aspx
TEXT NINE
Obligatory-Obligatorio
TEXT TEN
Obligatory-Obligatorio
NEWSGROUPS
Adapted from
http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212650,00.html
Textos "Opcionales"
FIREWALLS
Optional-Opcional
A firewall is a protective system that lies, in essence, between your computer network
and the Internet. When used correctly, a firewall prevents unauthorized use and
access to your network. The job of a firewall is to carefully analyze data entering and
exiting the network based on your configuration. It ignores information that comes
from an unsecured, unknown or suspicious locations. A firewall plays an important
role on any network as it provides a protective barrier against most forms of attack
coming from the outside world.
Firewalls can be either hardware or software. The ideal firewall configuration will
consist of both. In addition to limiting access to you computer and network, a firewall
is also useful for allowing remote access to a private network through secure
authentication certificates and logins.
While many people do not completely understand the importance and necessity of a
firewall, or consider it to be a product for businesses only, if your network or
computer has access to the outside world via the Internet then you need have a
firewall to protect your network, individual computer and data therein.
Adapted from
http://www.webopedia.com/didyouknow/hardware_software/2004/firewall_types.asp
FLASH MEMORY
Optional-Opcional
Adapted from
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci212130,00.html
TOUCHSCREENS
Optional-Opcional