Exploring Computer Science Students’ Skill In Translating Technology and Computer Terminologies
نویسندگان
چکیده
This research explores the skill of computer-science students in translating technology and computer terminologies. It is a mixture qualitative quantitative. The data collected by survey. participants are Amikom Purwokerto University. analysis executed using Molina-Albir theory translation techniques. then continued evaluating type equivalency from Kade. result shows that students' varies. techniques applied help to deliver meaning source text target text. Unfortunately, only half whole reaches total equivalence because its changes form. Hence, finding confirms background knowledge science provenly helpful interpret meaning. also arisen an assumption combination their linguistics considerably can establishing equivalency. Therefore, it expected findings give novelty studies for lecture giving lesson activity English class beneficial gives contribution solve the-real-world challenges.
منابع مشابه
Assistive technology in computer science
The purpose of this paper is to demonstrate how assistive technology can be incorporated into computer science as a valid method of demonstrating basic computer science principles, human-computer interaction methods, and social, legal, and ethical issues in computing.
متن کاملenhanced efl listening skill through computer-assisted vocabulary glossing
abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...
Development of masters modules in computer forensics and cybercrime for computer science and forensic science students
In mid-2004, it was decided that the list of optional modules available to students taking the MSc programme in Computing, Internet Law and Management at King’s College London (KCL) should be supplemented with a module in computer forensics (CF) and cybercrime. It was proposed that this module should be delivered as a reading course to be assessed by means of a dissertation and a linked viva vo...
متن کاملGlobal Journal of Computer Science and Technology
This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret sequence. The detection process is imple...
متن کاملGlobal Journal of Computer Science and Technology
Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JEELLS (Journal of English Education and Linguistics Studies)
سال: 2023
ISSN: ['2407-2575', '2503-2194']
DOI: https://doi.org/10.30762/jeels.v10i1.852