Language for Its Own Sake

نویسنده

  • Renée van Bezooijen
چکیده

he Mainland Scandinavian languages, i.e. Danish, Norwegian and Swedish, are so closely related that the speakers often use their own language when communicating with each other (so-called semi-communication, Haugen 1966). However, communication is not perfect and sometimes fails. Previous investigations (Maurud 1976, Bø 1978, Börestam 1987, Delsing & Åkesson 2005) aimed at getting a general impression of how well Scandinavians understand each other. It appeared that mutual intelligibility is highest between Norwegians and Swedes, whereas Danish is relatively hard to understand, especially for Swedish-speaking subjects (Perridon 2000).1 The investigations just mentioned measured the overall intelligibility2 of complete texts by means of open questions. Little attention was paid to the linguistic phenomena that can explain the differences in the level of understanding between the three languages. In complete texts, all linguistic levels (segmental, supra-segmental, lexical, morphological, syntactic) are combined and mixed, so that it is hard to assess the effect of separate linguistic phenomena. In the present article, we restrict the investigation of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Language Policy in Nigeria: Prospect for National Unity

Various studies on the National Policy on Education (NPE) have concentrated on the cognitive value of pedagogy and learning of the language aspect but few have viewed its importance on the togetherness of the nation - Nigeria. This paper deals with how the language policy can influence and ensure the co-existence of Nigeria in achieving self-actualisation, national unity, social, cultural, econ...

متن کامل

Assessment for/as Learning in Hong Kong English Language Classrooms: A Review

Multiple conceptualizations of the interrelation between assessment and learning yield three notions of assessment: assessment of learning, assessment for learning, and assessment as learning. This paper aims at uncovering roles and obstacles of assessment for learning and assessment as learning in English language classrooms in Hong Kong. Grounded upon the theory of constructivism and the noti...

متن کامل

Programming with a Purpose: Hank, Gardening and Schema Theory

Hank is a visual cognitive modelling language designed specifically for psychology students. The aim in designing Hank was to create an experience of cognitive modelling that focused on gaining a new perspective on psychological models rather than programming for its own sake. Recent informal analyses have investigated the effectiveness of Hank in its intended context of use, both as a paper an...

متن کامل

A Taxonomy of Indexing Structures for Mathematical Programming Modeling Languages

Indexing structures are of fundamental importance to mathematical programming modeling languages. We propose a taxonomy of the most commonly used indexing structures and illustrate it with 25 examples stated in plain but precise English. This paper is an independently useful part of a report that is far too long for inclusion in these proceedings. The full report works all 25 examples in AMPL, ...

متن کامل

Language Proficiency and Identity: Developing a Structural Equation Modeling (SEM) of Identity for Iranian EFL Learners

This study was an endeavor to develop a model of identity among Iranian EFL learners. To achieve this end, a multiphase design was implemented. Initially, it attempted to investigate different factors of identity to propose and validate a model. Thus, 120 EFL learners studying in different English language institutes in Iran were randomly selected, and 36 learners were interviewed about their v...

متن کامل

SAKE: Software Attestation for Key Establishment in Sensor Networks

This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret information in either node. In other words, the attacker can read and modify the entire memory con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012