搜档网
当前位置:搜档网 › 高级英语翻译英汉对照

高级英语翻译英汉对照

高级英语翻译英汉对照
高级英语翻译英汉对照

高级英语翻译英汉对照 ? Retaining and reviewing records of CDA configuration changes and audit activities associated with CDA configuration changes and employing {manual and/or automated} mechanisms to: - Document changes to CDAs, Notify designated approval authorities, and Prohibit implementation of changes until designated approvals are received and documented. 3.11.5 Security Impact Analysis of Changes and Environment 3.11.5 环境变化和安全影响分析 The {Calvert Cliffs 3 Nuclear Project, LLCJ's CST performs a security impact assessment before making changes to CDAs consistent with {Section 1.4.2.2 of this plan} to manage the cyber risk resulting from the changes. The CST evaluates, documents, and incorporates into the security impact analysis any identified safety and security interdependencies. The {Calvert Cliffs 3 Nuclear Project, LLC} performs and documents the security impact assessment as part of the change approval process. 3.11.6 Access Restrictions for Change 3.11.6 更改访问限制
1 / 22

{Calvert Cliffs 3 Nuclear Project, LLC} defines, documents, approves, and enforces physical and logical access restrictions associated with changes to CDAs and generates, retains, and audits the record {quarterly} and when there are indications that unauthorized changes may have occurred. {Calvert Cliffs 3 Nuclear Project, LLC} implements its configuration management program to address discovered deviations.
{Calvert Cliffs 3 Nuclear Project, LLC} employs automated mechanisms to detect unauthorized changes, to enforce access restrictions and to support subsequent audits of enforcement actions.
{Calvert Cliffs 3 Nuclear Project, LLC} documents the justification and details for alternate (compensating) security controls for situations in which a CDA cannot support the use of automated mechanisms to enforce access restrictions and to support subsequent audits of enforcement actions, including all of the following: ?
? ? ? ? ? Physically restricting access, Monitoring and recording physical access to enable timely detection and response to intrusions, Employing auditing and validation measures (e.g., security officer rounds, periodic monitoring of tamper seals), Ensuring authorized individuals are trustworthy and reliable in
2 / 22

accordance with 10 CFR 73.56, Ensuring that authorized individuals are operating under established work management controls, and Conducting post maintenance testing to validate that changes are implemented correctly.
3.11.7 Configuration Settings 3.11.7 配置设置 {Calvert Cliffs 3 Nuclear Project, LLC} applies configuration settings for CDAs by (1) documenting the most restrictive mode, (2) valuating operational requirements, and (3) enforcing and documenting the most restrictive operational configuration settings based upon explicit operational requirements. This is achieved by the following: ? ? ? ? ? Establishing and documenting configuration settings for CDAs that reflect the most restrictive mode, Documenting and approving any exceptions from the most restrictive mode configuration settings for individual components within CDAs based upon explicit operational requirements, Enforcing the configuration settings in CDAs and monitoring and controlling changes to he configuration settings in accordance with {Calvert Cliffs 3 Nuclear Project, LLC} policies and procedures, Documenting and employing automated mechanisms to {centrally}
3 / 22

manage, apply, and verify configuration settings, Documenting and employing {automated mechanisms and/or manual mechanisms} to respond to
unauthorized changes to {Calvert Cliffs 3 Nuclear Project, LLC}-defined configuration settings, and
? Documenting the justification for alternate (compensating) security controls for situations n which a CDA
cannot support the use of automated mechanisms to {centrally} manage, apply, and verify configuration settings, including all of the following:
- Physically restricting access, Monitoring and recording physical access to enable timely detection and response to intrusions, Employing auditing/validation measures (e.g., security officer rounds, periodic monitoring of tamper seals), Ensuring authorized individuals are trustworthy and reliable in accordance with 10 CFR 73.56, Ensuring that authorized individuals are operating under established work management controls, and Conducting post maintenance testing to validate that changes are implemented correctly. 3.11.8 Least Functionality
4 / 22

3.11.8 最小功能 {Calvert Cliffs 3 Nuclear Project, LLC} configures and documents CDA configuration settings to provide only essential capabilities and specifically prohibits, protects, and restricts the use of insecure functions, ports, protocols and services. {Calvert Cliffs 3 Nuclear Project, LLC} reviews CDAs {monthly} to identify and eliminate unnecessary functions, ports, protocols, and services. {Calvert Cliffs 3 Nuclear Project, LLC} documents and employs automated mechanisms to prevent program execution. {Calvert Cliffs 3 Nuclear Project, LLC} uses {white-lists, black-lists, and gray-lists} application control technologies. 3.11.9 Component Inventory 3.11.9 组件库存 {Calvert Cliffs 3 Nuclear Project, LLC} develops, documents, and maintains an inventory of the components of CDAs that has the following attributes: ? ? ? ? ? ? Accurately reflects the current system configuration, Ensures that the location (logical and physical) of each component is consistent with the authorized boundary of the CDA, Provides the proper level of granularity deemed
5 / 22

necessary for tracking and reporting and for effective property accountability, Updates the inventory of system components as an integral part of component installations and system updates, Employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available inventory of system components, Employs automated mechanisms to detect the addition of unauthorized components or devices into the
environment and disables access by such components or devices or notifies designated {Calvert Cliffs 3 Nuclear Project, LLC} officials, and
Documents the {names or roles} of the individuals responsible for administering those components. ?
MANAGEMENT CONTROLS 管理控制 3.12 System and Service Acquisition 3.12 系统和服务获取 3.12.1 System and Services Acquisition Policy and Procedures 3.12.1 系统与服务获取政策和程序 {Calvert Cliffs 3 Nuclear Project, LLC} develops, disseminates, and {annually} reviews and updates a formal, documented system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, {coordination among {Calvert Cliffs 3 Nuclear Project, LLC} entities}, associated system and service acquisition controls, and compliance.
6 / 22

{Calvert Cliffs 3 Nuclear Project, LLC} develops, disseminates, and {annually} reviews and updates formal, documented procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
3.12.2 Supply Chain Protection 3.12.2 供应链保护 {Calvert Cliffs 3 Nuclear Project, LLC} protects against supply chain threats and vulnerability by employing the following list of measures to protect against supply chain threats to maintain the integrity of the CDAs that are acquired: ? ? ? Establishment of trusted distribution paths, Validation of vendors, and Requiring tamper proof products or tamper evident seals on acquired products. {Calvert Cliffs 3 Nuclear Project, LLC} performs an analysis for each product acquisition to determine that the product provides the security requirements necessary to address the security controls in Sections 2 and 3 of this plan. {Calvert Cliffs 3 Nuclear Project, LLC} uses heterogeneity to mitigate vulnerabilities associated with the use of a single vendor's product.1 3.12.3 Trustworthiness
7 / 22

{Calvert Cliffs 3 Nuclear Project, LLC} requires that software developers employ software quality and validation methods to minimize flawed or malformed software.
{Calvert Cliffs 3 Nuclear Project, LLC} establishes, implements, and documents requirements to require all tools used to perform cyber security tasks or SSEP functions to undergo a commercial qualification process similar to that for software engineering tools that are used to develop digital instrumentation and control systems.
3.12.4 Integration of Security Capabilities 3.12.4 安全功能集成 {Calvert Cliffs 3 Nuclear Project, LLC} documents and implements a program to ensure that new acquisitions contain security design information, capabilities or both to implement security controls in Section 2 of this plan. Such security capabilities include the following: ? ? ? ? Being cognizant of evolving cyber security threats and vulnerabilities, Being cognizant of advancements in cyber security protective strategies and security controls, Conducting analyses of the effects that each advancement could have on the security, safety, and operation of critical assets, systems, CDAs, and networks and implementing these advancements in a timely manner, and
8 / 22

Replacing legacy systems as they reach end of life with systems that incorporate security capabilities.
{Calvert Cliffs 3 Nuclear Project, LLC} establishes timeframes to minimize the time it takes to deploy new and more effective protective strategies and security controls.
3.12.5 Developer Security Testing 3.12.5 开发人员安全测试 {Calvert Cliffs 3 Nuclear Project, LLC} documents and requires that system developers and integrators of acquired CDAs create, implement, and document a security test and evaluation plan to ensure that the acquired products meet all specified security requirements (1) that the products are free from known, testable vulnerabilities and malicious code by identifying and eliminating these following vulnerabilities and other vulnerabilities that may change with new technology: ? 1Weak, unproven, or nonstandard cryptographic modules, {Heterogeneity will be deployed in the acquisition of all CDAs where possible and applicable.} ? ? ? ?
9 / 22

? Insecure network protocols for sensitive communications, Known insecure software components or libraries, Known vulnerabilities, Insecure configuration files or options that act to control features of the application, Inadequate or inappropriate use of access control mechanisms to control access to system resources,
? ? ? ? ? ? ? ? ? ? ? ? ? Inappropriate privileges being granted to users, processes, or applications, Weak authentication mechanisms, Improperly or failing to validate input and output data, Insecure or inadequate logging of system errors or security-related information, Inadequately bounded buffers, Format string vulnerabilities, Privilege escalation vulnerabilities, Unsafe database
10 / 22

transactions, Unsafe use of native function calls, Hidden functions and vulnerable features embedded in the code, Implemented security features do not themselves act to increase the risk of security vulnerabilities, increase susceptibility to cyber attack, or reduce the reliability of design-basis functions. Use of unsupported or undocumented methods or functions, and Use of undocumented code or malicious functions that might allow either unauthorized access or use of the
system or the system to behave beyond the system requirements. (2) and developers cyber security program maintains the integrity of the acquired system until the product is delivered to the {Calvert Cliffs 3 Nuclear Project, LLC} by implementing equivalent security controls as described in RG 5.71 to prevent tampering and to provide high assurance that the integrity of the developed CDA is maintained until delivered to the licensee. {Calvert Cliffs 3 Nuclear Project, LLC} requires the developer to perform and document that security requirements are verified and validated and that security controls implemented in the product and used to meet the requirements of this plan are tested to ensure they are effective per Section 1.4.1.2. {Calvert Cliffs 3 Nuclear Project, LLC} requires documentation of all of the following activities: ? ? ?
11 / 22

? ? ? System design transformed into code, database structures, and related machine executable representations, Hardware and software configuration and setup, Software coding practices and testing, Communication configuration and setup (including the incorporation of reused software and commercial offthe-shelf products), The results of unit tests performed to ensure that the code was developed correctly and accurately and completely reflects the security design configuration transformations from the requirements, Details of the implementation of each required security feature within the developed code base. The listing includes reference the coded functions and modules within the code base that were developed to implement the security features, Security configurations implemented to meet security design features specified in the requirements, Operating system security configurations implemented to meet security design features specified in the requirements are documented, ?? ? For programming languages that support static analysis source code scanners, results of the following are documented:
12 / 22

- The static source code vulnerability analysis performed to inspect the developed code for potential
security defects, poor programming practices, hidden functions, and vulnerable features within the code during the implementation of the code base and methods applied to eliminate these vulnerabilities,
? The security defect tracking metrics used to capture and track the identification, type, classification, cause, and remediation of security defects found within the code, and The defects encountered during the translation of the design features specified in the requirements into code. For all programming languages, the results of the following are documented: - A dynamic source code vulnerability analysis performed to inspect the developed code for potential security defects, poor programming practices, hidden functions, and vulnerable features within the code during the implementation of the code base and methods applied to eliminate these vulnerabilities, The security defect tracking metrics used to capture and track the identification, type, classification, cause, and remediation of security defects found within the code, and The defects encountered during the translation of the design features specified in the requirements into code. - -
13 / 22

{Calvert Cliffs 3 Nuclear Project, LLC} requires that CDA developers/integrators:
? ? ? ? ? Perform configuration management during CDA design, development, implementation, and operation, Manage and control changes to the CDA, Implement only {Calvert Cliffs 3 Nuclear Project, LLC} approved changes, Document approved changes to the CDA, and Track security flaws and flaw resolution. 3.12.6 Licensee/Applicant testing 3.12.6 被许可方/申请人测试 {Calvert Cliffs 3 Nuclear Project, LLC} verifies and validates the results of the developer's security testing in conducted in accordance with Section 3.12.5 above. {Calvert Cliffs 3 Nuclear Project, LLC} is responsible for the following: ? Testing CDA (e.g., offline on a comparable CDA) security devices, security controls, and software to ensure that they do not compromise the CDA or the operation of an interconnected CDA operation before installation, Testing to ensure that CDAs do not provide a pathway to compromise the CDA or other CDAs,
14 / 22

Implementation of the security controls in Sections 2 and 3 of this plan in accordance with the process described in Section 1.3.1.6 of this plan,
Testing of the security controls for effectiveness, as described in Section 1.4.1.2 of this plan,
Performance of vulnerability scans, in accordance with Section 1.4.1.3 of this plan and Section 3.13.1 of this plan, against the CDA in its integrated state and correction, elimination, or discussion of discovered vulnerabilities,
Installation and testing of the CDA in the target environment, and Performance of an acceptance review and test of the CDA security features. ? ? ? ? ? ? {Calvert Cliffs 3 Nuclear Project, LLC} documents the following: ? ? ? Security controls implemented in accordance with Section 2 of this plan. Verification of the effectiveness of the security controls implemented in accordance with Section 3 of this plan. Security design features developed to address the identified security requirements for the CDA (if any), in addition to the security controls implemented in accordance with Section 2 of this plan. For each security feature or configuration to be implemented, the documentation includes a description of the feature, its method of implementation, and any configurable options associated with the feature are
15 / 22

provided. Each security feature designed into the system is traceable to its corresponding security requirement.
The security reviews of the implemented design by the cyber security organization responsible for the protection of the critical assets/systems/networks are documented. The review ensures that the security design configuration item transformations from the requirements implemented are correct, accurate, and complete.
{Calvert Cliffs 3 Nuclear Project, LLC} requires {annual} audits of CDAs to verify the following:
? ? ? The security controls present during testing remain in place and are functioning correctly in the production system. CDAs are free from known vulnerabilities and security compromises and continue to provide information on the nature and extent of compromises, should they occur. The change management {process and/or program} is functioning effectively and is recording configuration changes appropriately. 3.13 Security Assessment and Risk Management 3.13 安全评估与风险管理 3.13.1 Threat and Vulnerability Management 3.13.1 威胁和漏洞管理
16 / 22

{Calvert Cliffs 3 Nuclear Project, LLC} does the following: ? Perform assessments and scans for vulnerabilities in CDAs {no less frequently than once a quarter} and at random intervals in accordance with Section 1.4.1.3 of this plan and when new potential CDA vulnerabilities are reported or identified. Employ vulnerability scanning tools and techniques that promote interoperability among tools and automating parts of the vulnerability management process by: ? ? ? Enumerating platforms, software flaws, and improper configurations, Formatting and making transparent checklists and test procedures, and Measuring vulnerability impacts. ? Analyze vulnerability scan reports and remediate vulnerabilities within a time period that will provide high assurance that CDAs are protected from cyber attacks up to and including the DBT. Eliminate similar vulnerabilities in other CDAs. Employ vulnerability scanning tools that include the capability to update the list of cyber vulnerabilities scanned and update the list of CDA vulnerabilities scanned {monthly} and when new vulnerabilities are identified and reported.
17 / 22

Employ vulnerability scanning procedures that maximize the breadth and depth of coverage (i.e., CDA components scanned and vulnerabilities checked).
Discern and document what information associated with the CDA is discoverable by adversaries.
Perform security testing to determine the level of difficulty in circumventing the security controls of the CDA. {Testing methods include penetration testing, malicious user testing, and independent verification and validation.}
Include privileged access authorization to CDAs for selected vulnerability scanning activities to facilitate more thorough scanning.
???? ? ? ? Employ automated mechanisms to compare the results of vulnerability scans over time to determine trends in CDA vulnerabilities and mitigation/flaw remediation activities. Employ automated mechanisms to detect and notify authorized personnel of the presence of unauthorized software on CDAs. Ensure that SSEP functions are not adversely impacted by the scanning process. Where this may occur, CDAs are removed from service or replicated (to the extent feasible) before scanning is conducted or be scheduled to occur during planned CDA outages whenever possible. Where {Calvert Cliffs 3 Nuclear Project, LLC} cannot conduct
18 / 22

vulnerability scanning on a production CDA because of the potential for an adverse impact on SSEP functions, alternate controls (e.g., providing a replicated system or CDA to conduct scanning) are employed.
The {Calvert Cliffs 3 Nuclear Project, LLC} reviews historic audit logs to determine if a vulnerability identified in the CDA has been previously exploited.
3.13.2 Risk Mitigation 3.13.2 缓解风险 Protection and mitigation of risk are achieved by implementing (1) the defense-in-depth strategies discussed in Section C.3.2 of to RG 5.71, (2) the security controls described in Sections 2 and 3 of this plan, and (3) digital equipment and software cyber attack detection, prevention, and recovery techniques and tools to the systems, structures, and components within the scope of the rule and (4) Section 1.4 of this plan. {Calvert Cliffs 3 Nuclear Project, LLC} has the detailed information on how these requirements are implemented to achieve the high assurance objectives of security controls specified in this plan. The detailed information is available for NRC inspections and audits. 3.13.3 Corrective Action Program 3.13.3 纠正措施方案 {Calvert Cliffs 3 Nuclear Project, LLC} established, implemented, and documented the criteria consistent with RG 5.71 for adverse conditions and the requirements for corrective action. The adverse impact resulting from a cyber
19 / 22

security incident is evaluated, tracked, and adjusted in accordance with the {Calvert Cliffs 3 Nuclear Project, LLC} Corrective Action Program and in a manner consistent with RG 5.71.
20 / 22

翻译硕士英语翻译常考单词汇总

翻译硕士英语翻译常考单词汇总 2014年 1) articulate 清晰的表达, 2) by all accounts根据、根据报道;byone’s own account根据某人自己所说,letalone更别提, 3) intensity紧张,abruptly突然地,sudden突然,soft柔和的,passage段落,rarely很少、几乎不,composer作曲家,compose作曲、编写, 4) associate联系, 5) suffer遭受, inevitable不可避免, render转换、使变成; 2013年 1) strike打、震撼,for all尽管,style风格,urge需求、督促、鼓励,decoration装饰, 2)sacred神圣的,crude原始、粗糙,as opposed to与相反,shelter避难所, 3) ineffect实际上,urban城市,discernible容易看出的,discern看出、识别, 4)blame批评, 5)implicit隐含的,explicit明确的,reference谈到、提及、参考,synthetic人造的; 2012年 1) impulse冲动,unification统一、一致,generative生产的、生成的,generate产生, 2) constrain力劝、强迫、限制,constraint限制, 3) filter过滤, cognitive认知的, 4) empirical实证的、根据经验得到的,bias偏见, 5) track跟踪; 2011年 1) erroneous错误的,error错误, 2) sustain支持、维持,illusion幻觉,conscious有意识的, 3) justification合理,借口,justify证明是公正的,rationalization合理,exploitation剥削、开发, bottom底, 4) circumstance环境, 5) upside积极的、正面的,contain包含,be up to取决于,array展示、陈列、一系列; 丰富的词汇量会让我们在英语考试中占得优势,小编整理2006-2010年考研英语中真题中的常用词汇,希望大家认真背诵,集中记忆,相信会对大家的考研有很大帮助,也预祝大家考研成功。 2010年

高级英语第一册课后翻译练习汇总

Lesson 1The Middle Eastern Bazaar 1)一条蜿蜒的小路淹没在树荫深处 2)集市上有许多小摊子,出售的货物应有尽有 3)我真不知道到底是什么事让他如此生气。 4)新出土的铜花瓶造型优美,刻有精细、复杂的传统图案。 5)在山的那边是一望无际的大草原。 6)他们决定买那座带有汽车房的房子。 7)教师们坚持对学生严格要求。 8)这个小女孩非常喜欢他的父亲。 9)为实现四个现代化,我们认为有必要学习外国的先进科学技术。 10)黄昏临近时,天渐渐地暗下来了。 11)徒工仔细地观察他的师傅,然后照着干。 12)吃完饭弗兰克常常帮助洗餐具。Frank often took a hand in the washing-up after dinner. Lesson 2 Hiroshima-the Livest city in Japan 1)礼堂里一个人都没有,会议一定是延期了。 2)那本书看上去很像个盒子。

3)四川话和湖北话很相似,有时很难区别。 4)一看见纪念碑就想起了在战斗中死去的好友。 5)他陷入沉思之中,没有例会同伴们在谈些什么。 6)他干的事与她毫无关系。 7)她睡不着觉,女儿的病使她心事重重。 8)这件事长期以来一直使我放心不下。 9)他喜欢这些聚会,喜欢与年轻人交往并就各种问题交换意见。 10)大家在几分钟以后才领悟他话中的含义。 11)土壤散发着青草的气味。 12)我可以占用你几分钟时间吗? 13)你能匀出一张票子给我吗? 14)那个回头发上了年纪的人是铜匠。 Lesson 4 Everyday Use for your grandmama 1.一场大火把贫民区三百多座房子夷为平地。 2.只要你为人正直,不怕失去什么,那你对任何人都不会畏惧。

法律英语翻译(2)

法律英语翻译技巧(二)法学语言与法学语言翻译 例1:The law holds that the individual is responsible for his acts. The law also indicates what is good and right, and what may and should be done. It also indicates what is evil and wrong, and should not and may not be done. The law further holds that what is evil and wrong is a crime and may not be done, and if done, renders the doer liable to punishment. The law also recognizes the principle that man has free will and that, with certain exceptions, he exercises free will in commission of any crime that he may commit. 译文1:法律认为公民应对自己的行为负责。法律还规定什么是美好的和正确的,规范了哪些事是允许做或应该做的。同样,法律规范了什么是邪恶的和错误的。法律还进一步明确规定哪些邪恶的错误的事是不能做的犯罪行为看,如果某人做了这样的事,那么该行为就要受到惩罚。同样,法律还承认这样一个原则,每个公民除犯罪自由外都具有自由意志,如果某人在各种违法活动中实施其自由意志,那么他就可能触犯法律。 译文2:法律规定人人应对自己的行为承担责任,分清善良和正义,规范了人们的行为准则;法律还认为,作孽枉法即是犯罪,法不可恕,

法律英语翻译专业词汇大全

法律英语翻译专业词汇 大全 This model paper was revised by LINDA on December 15, 2012.

equality of men and women, equality between [of] the sexes南昌市 Nanchang Municipality南京市 Nanjing Municipality南宁市 Nanning Municipality南平市Nanping Municipality南通市 Nantong Municipality脑外伤综合症 combined external head injuries年报 annual report年度账目 annual accounts宁波市 Ningbo

Municipality宁静的占有权 quiet possession宁夏回族自治区 Ningxia Hui Nationality Autonomous Region扭亏为盈 turn a loss-making enterprise into a profitable one扭曲金融分配 distorted allocation of financial resources纽约公约 New York Convention农村剩余劳动力 surplus rural labour农村信用社 rural credit cooperatives农副产品采购支出 outlays for agricultural procurement农工商联合企业 agro-industrial-commercial combines农垦区 land reclamation district农民集体 peasant collective农药残留物 pesticide residue农业部 Ministry of Agriculture农业发展银行 Agriculture Development Bank农业税agricultural tax农转非 rural residents become urban residents虐待 maltreat虐待罪 crime of abuse挪用公款 misappropriation of public funds殴打他人 assault 偶犯 casual offender排斥外在证据原则 parol evidence rule排除责任条款 exclusion clause排纷解讼 dissolution of disputes and litigation排他性的独占权exclusive monopoly right派生的分租人 derivative under-lessor派生的分租租契derivative under-lease判案理由 adjudicative reasons, grounds of judgment判处sentence判定 confirm判定债务人没有付款的誓章 affidavit of default on the part of the judgment debtor判决 judgment判决理据 grounds of judgment判决书 written judgment判决执行 enforcement of the judgment判刑 sentence泡沫经济bubble economy泡沫效应 bubble effect培育新的经济增长点 to tap new sources of economic growth赔偿 compensate赔偿金 compensation money赔偿损失 compensation for losses赔偿责任 liability to damages配股 allotment of shares, rationed shares配合饲料 compound/mix feed配偶 spouse配偶的父母 parents-in-law配套改革concomitant reforms配套人民币资金 local currency funding of批复 Reply批评教 育 re-education批准 approve, approval批准机关 approval authority批准文号

英语翻译汇总

Unit One 1. Personal consumption expenditure, consisting of the market value of goods and services purchased by individuals and nonprofit institutions as well as the value of food, clothing, housing and financial services received by them as income in kind. 个人消费开支:指个人和非盈利机构以物品形式得到的食品、衣服、住房和金融服务,以及他们购置的产品和劳务的市场价值。 2. Gross private domestic investment, consisting of newly produced capital goods —buildings and equipment — acquired by private business and non-profit institutions, including the value of inventory changes and all new private houses. Gross investment can also be seen as consisting of two portions. One portion is necessary to replace the depreciation — or wearing out — of some of the existing stock of capital goods. The remaining portion is net investment and represents an addition to the size of the stock of capital goods. 私人国内总投资:指私人企业和非盈利机构所需的新产品的资本货物——建筑和设备,其中包括存货变化和所有新的私人住房屋价值。总投资还可以看成包括两部分。一部分是以替代现存资本货物的消耗或磨损。另一部分是净投资,它增加了对资本货物的存货量。 3. Government purchases of goods and services, consisting of general government expenditure for compensation of employees and net purchases from business and from abroad. 政府购买的物品与劳务:指补偿雇工和从企业及国外的进料净额所支付的一般行政费用。 4. Net exports of goods and services, consisting of the amount of exports minus the amount of imports. 商品和劳务的净出口:指减除进口量的出口量。 5. Economics involves that study of topics like wealth and poverty, money and banks, incomes, taxes, prosperity and depression, large enterprises and labor unions, and hundreds of other matters that intimately how easy or how hard it is to get a job, how much we can earn in our chosen occupations, and how much our paychecks will buy after we receive them. 经济学涉及的研究课题有财富和贫困、金钱和银行、收入、税收、繁荣和萧条、大企业、工会以及几百种直接影响我们生活方式的其他方面。经济实力影响我们日常生活的各个方面,包括获得职业的难易、所选定工作的收入多少、得到工资后能买到多少东西等。 6. In fact, probably without exception, each topic in economics not only touches somewhere on your own personal life but is also important to some current economic problems of government on social policy and is, at the same time, involved in the long-range concern of human history. 事实上,经济学中的每一个课题可能毫无例外地不仅接触到你的个人生活,而且对一个政府的当前某些经济问题或社会政策,也有着重要意义。同时,经济学中的每个课题也涉及到人类历史中长期以来所关心的问题。 7. It is particularly worth noting that the services of whole-salers, retailers, bankers, and similar “middlemen” are an important part of the productive process. After all, it

《高级英语》课文逐句翻译(12)

《高级英语》课文逐句翻译(12) 我为什么写作 Lesson 12:Why I Write 从很小的时候,大概五、六岁,我知道长大以后将成为一个作家。 From a very early age,perhaps the age of five or six,I knew that when I grew up I should be a writer. 从15到24岁的这段时间里,我试图打消这个念头,可总觉得这样做是在戕害我的天性,认为我迟早会坐下来伏案著书。 Between the ages of about seventeen and twenty-four I tried to adandon this idea,but I did so with the consciousness that I was outraging my true nature and that sooner or later I should have to settle down and write books. 三个孩子中,我是老二。老大和老三与我相隔五岁。8岁以前,我很少见到我爸爸。由于这个以及其他一些缘故,我的性格有些孤僻。我的举止言谈逐渐变得很不讨人喜欢,这使我在上学期间几乎没有什么朋友。 I was the middle child of three,but there was a gap of five years on either side,and I barely saw my father before I was eight- For this and other reasons I was somewhat lonely,and I soon developed disagreeable mannerisms which made me unpopular throughout my schooldays. 我像一般孤僻的孩子一样,喜欢凭空编造各种故事,和想像的人谈话。我觉得,从一开始,我的文学志向就与一种孤独寂寞、被人冷落的感觉联系在一起。我知道我有驾驭语言的才能和直面令人不快的现实的能力。这一切似乎造就了一个私人的天地,在此天地中我能挽回我在日常生活中的不得意。 I had the lonely child's habit of making up stories and holding conversations with imaginary persons,and I think from the very start my literary ambitions were mixed up with the feeling of being isolated and undervalued. 我知道我有驾驭语言的才能和直面令人不快的现实的能力。这一切似乎造就了一个私人的天地,在此天地中我能挽回我在日常生活中的不得意。 I knew that I had a facility with words and a power of facing unpleasant facts,and I felt that this created a sort of private world in which I could get my own back for my failure 还是一个小孩子的时候,我就总爱把自己想像成惊险传奇中的主人公,例如罗宾汉。但不久,我的故事不再是粗糙简单的自我欣赏了。它开始趋向描写我的行动和我所见所闻的人和事。

法律英语翻译练习与答案-0609

练习1:外国合营者如果有意以落后的技术和设备进行欺骗,造成损失的,应赔偿损失。If the foreign joint venturer causes any losses by deception through the intentional use of backward technology and equipment, it shall pay compensation for the losses. 修改提示:单复数考虑不周;用语不够简洁。 答案(修改要点):causes any losses →causes any loss(es) 造成一项或多项损失时都应当赔偿,不能仅用复数形式。 pay compensation for the losses →pay compensation therefor (therefor=for that/them) 练习2:人民法院、人民检察院和公安机关办理刑事案件,应当分工负责,互相配合,互相制约,以保证准确有效地执行法律。 原译文:The people’s courts, people’s procuratorates and public s ecurity organs shall, in handling criminal cases, divide their functions, each taking responsibility for its own work, and they shall co-ordinate their efforts and check each other to ensure correct and effective enforcement of law. 修改提示:“分工负责”,应理解为:侧重点在“负责”,而非“分工”,即分工过程中各负其责;respective 比own 更为妥当、准确;原来的译文中,and they shall …比较啰嗦,更严重的问题是,使to ensure …割断了与divide their functions 的联系。 答案(修改要点):in handling criminal cases, divide their functions, each taking responsibility for its own work, and they shall co-ordinate their efforts and check each other to ensure correct and effective enforcement of law.→… in handling criminal cases, take responsibility for their respective work while dividing functions, co-ordinate, and check each other, to ensure correct and effective enforcement of law. 练习3:商标注册人享有商标专用权,受法律保护。 原译文:Trademark registrants shall enjoy the right to exclusive use of their trademarks and shall be protected by law. 修改提示:商标专用权的译文“貌合神离”,立法原意是“商标专有权”;受法律保护的主语有些歧义,可加括号处理;原文shall滥用,因为并未刻意强调“必须,一定要”。 答案(修改为):Trademark registrants have the exclusive trademark right, (and are) protected by law. 练习4:被告人的犯罪情节极其严重、社会影响极其恶劣、社会危害极其严重。 原译文:The extremely serious circumstances of the offense committed by the accused have brought abominable influence and severe hazard to the whole society. 修改提示:bring的用法有些生硬,动宾搭配不太适当。 答案(修改为):have brought abominable influence and severe hazard to the whole society. → have exerted an abominable influence and posed a severe hazard to society. (exert, vt. 施加,产生,如exert pressure on, exert an influence on; abominable, adj. 可恶的,极坏的;pose v. 提出,形成,成为;使摆好姿势pose a problem; pose an obstacle/a threat to …) 练习5:买卖双方同意按下列条款由卖方出售,买方购进下列货物:货号; 品名及规格;数量;单价;总值(数量及总值均有_____%的增减, 由卖方决定);生产国和制造厂家;包装;唛头;装运期限;装运口岸;目的口岸;保险;

高级法律英语翻译实践,第二课

第二课法律、民主与道德分歧 最近人们常听说,在美国及其他的地方,在公开演讲和市民生活中,对手之间的相互尊重和待人接物的礼仪风尚正在减弱。有些人从种种雄辩理念中找到一种指标可能,即重要的是在许多道德分歧问题上“赞同不同意见”。许多这些观念对此类问题存在客观真理。实践共识或者两者都存在的可能性,趋于持怀疑态度。其他人则倾向于把实质性的道德争议完全排除于政治领域之外,以免不可避免要表达的道德上的政治分歧的观念危害到社会的稳定性。然而,在两本有价值的关于道德分歧的政治和法律含义的新书中,则体现了另一种不同的趋势。《民主和意见分歧:政治上难免道德冲突之探源及其对策》,政治理论家艾美?古特曼和丹尼斯?托普逊著;《法律推理和政治冲突》,法律学者卡斯桑斯坦著,提出了对公民生活行为道德分歧内涵的反思,和我们的政体如何处理牢固的道德分歧的具体建议。 1.罗尔斯和理性分歧之事实 曾参加过鸡尾酒会或在大学里教授过伦理学或政治学理论的人,很可能熟悉下列驳论的套路。社会主流不赞同,比如堕胎、色情或者同性恋行为的道德准则。道德分歧的现象表明,这些问题不存在客观真理,只有主观观点。在更大范围内,任何人都没有权利将他自己的主观观点强加于那些恰恰不赞同他们的人身上。因此法律禁止、限制甚至反对堕胎、色情或者同性恋行为的做法不正当的侵犯了人们的自由。 然而稍作反思,人们就会发现这种推理套路中有大量的谬误。也许最受争议的便是它从道德分歧之存在中得出不存在客观道德真理的推论,而这一推论违背了社会常规性。打个比方,如果埃里克斯主张奴隶制是道德性的错误,那么贝尔塔不赞同的现象并不意味着埃里克斯的观点是错误的。实际上,埃里克斯也许对奴隶制的道德性错误想法有误,但贝尔塔不赞同的这一仅有的现象是不构成埃里克斯主张错误的充分理由的。毕竟,贝尔塔的主张也有可能是错误的。如果查尔斯还没有形成自己关于奴隶制的观点,但正希望形成一个正确的观点,那么在得出一个判定之前,他将会把埃里克斯关于奴隶制的道德性的论证和贝尔塔的反证放在一起加以考虑。仅仅从埃里克斯和贝尔塔分歧这一现象中,查尔斯是不可能理性地得出该问题不会有客观真理的结论。此外,如果埃里克斯和贝尔塔的争论从奴隶制转向论证堕胎、同性恋行为、色情、娱乐性使用毒品或其他任何当前有争议的道德问题上,这样的结论依然是不合理的。 但是如果埃里克斯和贝尔塔都是“理性之人”,又该如何呢?如果理性之人对某行为是否不道德发生分歧,是否就意味着该问题不存在客观真理而只有主观观点呢?并非如此。他们的分歧仅表明他们其中之一是错误的,或者他们都是错误的。即便是理性之人也会犯错误,有时也会信息不全。埃里克斯或贝尔塔可能完全或部分的忽视了或者未能充分注意到某些相关的现象或价值。你或他(或者我们大家)都可能正在推理中犯逻辑性的错误或其他的错误。这样或那样的偏见也许或妨碍一个关键的推论或其他的洞悉。 当然,相信客观道德真理的人(像我一样)并非认为那些客观真理总是那么明显,道德问题也从不棘手。相反,某些道德问题特别的棘手。有些道德问题是自身棘手,而有些道德问题的棘手是因为人们所处的文化环境中的物质、偏见、私利或其他因素使相关价值趋于模糊,并妨碍了关键洞察力。理性之人遇见此种情况也难以幸免。然而道德问题的棘手并不是暗示着问题没有正确的答案。即使理性的分歧也并不表明客观真理的缺失。 至此,我一直想表明的是,与人们在鸡尾酒会或大学教室的听闻不同,分歧存在并不意味无客观道德真理——即便是“理性的分歧”,即,有关理性之人自己在多数场合下也可能产生分歧的棘手的道德问题之分歧。但是,有一个不太直接但相当精妙的,从理性之人间道德分歧之事实,论证得出涉及法律和公共政策中充满特定道德问题的、开明结论的方法。约翰?罗尔斯最近的著作中借助于他所谓的“理性多元主义”事实,作为其他问题除外而包含

英语翻译总结

Unit1 中译英 1. 男孩们,例如杰克和大卫,对我都很友好。(such as) Boys such as Jack and David are very friendly to me. 2.在作出这一决定的过程中,他起了重要的作用。(play a role in) He played an important role in making the decision. 3. 你如果找不到这本书没关系。(matter) It doesn’t matter if you can’t find the book. 4. 帮助他们就是帮助拯救我们自己。(by helping…) By helping them we are helping (to) save ourselves 5. 我愿意做你所期望我做的任何事情。(be willing to do, whatever)I’m willing to do whatever you expect me to do. 英译中 1. In fact, anyone can be a hero ― even you! 事实上,任何人都可能成为英雄——甚至你也能! 2. Y ou don’t have to save someone from a burning building or fight a robber.你不必从燃烧的大楼里救出某个人,或者与抢劫犯搏斗。 3. It doesn’t matter if you do something big or small. 你做的事或大或小,这并不重要紧。 4.A hero is a person who helps others in some way. 英雄是以某种方式帮助他人的人。 5. Help older people around the neighborhood.

高级英语翻译[试题]

高级英语翻译[试题] 1. 她,一个瘦弱多病的女孩子,以她坚强的毅力写出了一部部催人泪下的奋进小 说。(同位语语序)
A thin and weak girl susceptible to diseases,she wrote one inspiring novel after another with her strong will. b5E2RGbCAP
2. 这 3 个县经历了那场中国 70 年代第四次较为严重的遍及数省的自然灾害。 (英文定语的语序)
The three counties underwent the fourth most serious natural disaster that plagued several provinces in China in the 1970’s. p1EanqFDPw
3. 这首歌并不曾继续多久,就和笛声共同消失在黑暗里了。(拆开状语从句) The singing did not last very long.Soon,together with the sound of the flute it faded away in the darkness. DXDiTa9E3d
4. 说毕,张道士方退出去。这里贾母与众人上了楼,在正面楼上归坐。凤姐 等占了东楼。(合句法)
Thereupon the priest withdrew ,while the Lady Dowager and her party went upstairs to RTCrpUDGiT
, Xifeng and her companions occupying that to the east.sit in the main balcony5PCzVD7HxA
5. 这日他比平日起得迟,看见她已经伏在洗脸台上擦脖子,肥皂的泡沫就如 大螃蟹嘴上的水泡一般,
高高的堆在两个耳朵后面。(缩句法)
1 / 14

法律英语翻译

Legal English (revised version for the students) Ch.1 The Main Features of Legal English 一、法律英语的英译: David Mellinkoff(加州大学洛杉矶分校法学院教授):《The Language of the Law》1963 1.legal English---Lawful English Legal parlance(说法、用语)/legal lingo(行话、隐语)/legal jargon(行话、黑话)/legalese( 法律八股文)/language of jurisprudence(法理语言) 2. the English Language of the Law or shortened as “the language of the law” 3. 法律英语与法学英语 二、法律英语的范围: 是否凡是涉及法律的英语(词汇、表达方法、句子结构……)都是法律英语? 英美法学界所公认的法律英语主要是指普通法国家(common-law countries)的法律人所用的习惯语言(customary language),包括某些词汇、短语,或具有特色的一些表达方法(mode of expressions)。 三、法律英语的主要特点: I. precise or exact (准确) 正常情况下,起草法律文件时,用词造句务必十分精准(with great exactness),因为一旦笔者的思想、观点、企图落实成文字,即成为法庭判断是非的重要依据,因为按严格解释原则(principle of strict construction)或唯名论原则(principle of nominalism),尽管实践中还存在推测意图原则(principle of presumed intent),但其不占主导地位,书面文字仍然是法官解释法律文件的唯一依据。 实务中鉴于对法律文件中文字的理解不一,也是常有纠纷出现: e.g. The Charter required that directors “shall be elected on a vote of the stockholders representing not less than two-thirds of outstanding capital st ock of the corporation.” 甲方理解成:被选上董事的人需三分之二的股东投票赞成(a candidate to be elected needs the votes of two-thirds of the stockholders ) 乙方则认为:选董事时须有三分之二的股东出席(two-thirds of the stockholders must be present at the meeting at which the election is held) What’s the judge’s opinion? e.g. 一个阿肯色州的美国人临终前写了一个遗嘱,遗嘱写道: The remainder of the testator’s property should be “divided equally between all of our nephews and nieces on my wife’s side and my niece.” 问题出在对“between”一词的理解上。立遗嘱人妻子一边的外甥和外甥女加在一起共有22个。这句话是指立遗嘱人的遗产的一半归其妻子方的22个外甥和外甥女,另一半归其本人一方的外甥女?还是指将遗产在双方的外甥外甥女中平均分配呢? 为达准确之目的,常使用下列招法: 1. 使用专门术语(下文有述) 2. 重复使用具有绝对含义的词汇,如all , none, perpetuity, never, unavoidable; 3. 使用具有绝对限制含义的短语:

法律英语_何家弘编_第四版课文翻译(1-20课)

第一课美国法律制度介绍 第一部分特征与特点 美国既是一个非常新的国家也是一个非常老的国家。与许多别的国家相比它是一个新的国家。同时,它还因新人口成分和新州的加入而持续更新,在此意义上,它也是新国家。但是在其它的意义上它是老国家。它是最老的“新”国家——第一个由旧大陆殖民地脱胎而出的国家。它拥有最古老的成文宪法、最古老的持续的联邦体制以及最古老的民族自治实践。 美国的年轻(性)有一个很有意思的特点就是它的历史肇始于印刷机发明之后。因此它的整个历史都得以记录下来:确实可以很有把握地说,任何其它国家都没有像美国这样全面的历史记录,因为像在意大利、法国或者英国过去的传说中湮没的那样的事件在美国都成了有文字记载的历史之一部分。而且其记录不仅全面,还非常浩繁。不仅包括这个国家自1776年以来的殖民时期的记录,还有当前五十个州以及各州和联邦(nation)之间错综复杂的关系网络的历史记录。因此,据一个非常简单的例子,美国最高法院判例汇编有大约350卷,而一些州的判例汇编也几乎有同样多的卷数:想研究美国法律史的读者要面对的是超过5000巨卷的司法案例。 我们不能说一个文件或几个文件就能揭示出一国人民或其政府的特性。但如果横跨一百多年的千百万个文件敲出始终如一的音调,我们就有理由说这就是其主调。当千百万个文件都以同样的方式去解决同样的中心问题,我们就有理由从中得出可以被称为国民特定的确定结论。 第二部分普通法和衡平法 同英国一样,美国法律制度从方法论上来说主要是一种判例法制度。许多私法领域仍然主要是由判例法构成,广泛而不断增长的制定法一直受制于有约束力的(解释制定法的)判例法。因此,判例法方法的知识以及使用判例法的技巧对于理解美国法律和法律方法是极其重要的。 从历史的角度来看,普通法就是由英国皇家法院的巡回法官的判决所得出的普通的一般法——优于地方法。采纳或执行某项诉讼请求是以存在法院令状这种特殊形式的诉为前提的,而这就使最初的普通法表现为由类似于古罗马法的“诉”所构成的体系。如果存在令状(于1227年),诉讼请求就可以被采纳或执行;没有法院令状(为前提)的诉讼请求就没有追索权,因而该诉讼请求也不存在。“牛津条例”(1285年)禁止创设除了“个案令状”之外的新令状,这种“个案令状”使该制度变得较为灵活了,而且导致了后来合同和侵权法的发展。 对于诉的形式的严格限制及由此产生的对追索权的限制导致了衡平法和衡平判例法的发展。“衡平”的一般意义就是寻求“公平”,即公平且善良地裁决,它最初是由国王,后来由作为“国王良知守护人”的大法官颁行,以便在艰难的案件中提供救济。但是到了十四世纪,衡平法和衡平判例法发展成了一个独立的法律制度和与一般的普通法法院一争高下的司法系统(衡平法院)。其规则和格言变得非常固定而且在某种程度上不像在其它法律制度中一样灵活。衡平法的特点有:以特定履行(或实际履行)的方式提供救济(与普通法提供补偿性损害赔偿金的救济方式形成对照);强制令(为或者不为某项具体行为的临时或者最终法令);渗透了整个法律制度并且能在许多场合下揭示现代法律概念的起源的所谓的衡平法格言的发展。不过,一般都是只有在普通法救济不充分时,才会出现衡平法救济。比如,优于普通法损害赔偿金被认为是不充分的,这是因为考虑到不动产所具有的唯一性,这些赔偿金无法补偿不动产购买人(的损失),就可能判以特定履行购买不动产。 与普通法一样,衡平法通过司法接纳或通过明确的制定法条款,成了美国法律的一部分。目前,这两个法律制度在许多美国司法管辖区中得以融合(始于1848年的纽约),因而,在这些司法管辖区以及联邦的实践中只存在一种形式的民事诉讼。只有为数很少的州还保留着单独的衡平法院。尽管如此,提及这一历史演变仍然是很重要的,因为它一方面解释了许多当代法律概念(如财产法中的所有权分割)的起源和意义,另一方面,它仍然与做出某些裁决有一定的关联,比如是否有权获得陪审团的审理(这仅发生与普通法的讼案中,在其它案件中仅由法官审理)。另外,这种区别将决定“通常的”普通法赔偿金救济是否适用或者是否可以使用“特别的”衡平法特定履行救济。 “判例法”代表了整个的法官造法体系,而且在现代还包括了普通法和衡平法先例。在不准确的和令人迷惑的用法中,“普通法”和“判例法”这两个术语通常被当作同义词来使用,在这里,“普通法”这个术语一般代表着法官制定的法,以示区别制定法。“判例法”总是代表着法官制定的法律,而“普通法”则相对来说,根据想表达的意思不同,要么代表普通法主题事项(即具体问题)上法官制定的法律,要么在更广范围内指所有法官制定的法律。 第二课法律职业 第一部分律师协会 法律职业的规范主要是各州的事务,每一各州对于执业许可都有其自己的要求。大多数州都要求三年的学业和法律学位。各州自行管理本州申请律师资格的书面考试。不过,几乎所有的州都利用“多州律师资格考试”,这是一种长达一天的多项选择测试,在这项考试之外,各州还会再增加一次主要是关于其本州法律的时长一天的论文考试。大多数申请人都可以通过第一次考试,而且许多失败者都会在下一次考试中通过。每年有四万多人通过这些考试,在经过人品调查之后,他们便可获准在相应的州执业许可。在获得许可之前或之后都不要求实习。到各联邦法院执业的许可规则互不相同,但一般来讲,那些获准在州最高法院执业的律师在办理一些无关紧要的手续之后即可获准在联邦法院执业。 律师执业范围通常仅限于一个地区,因为尽管律师可以代表当事人到其它地区办理事务,但是一个人只能在其获得许可的州内执业。人们习惯雇用本州的律师办理其它洲的事务。但是,只要一个人已经在其获得职业资格的州执业达一定时间(通常是五年),那么他移居到另外一个州时通常无需考试便可获得执业许可。 律师不仅可以从事法律事务,还允许从事任何其他公民能从事的事务。执业律师在企业客户的董事会中工作、从事商业或者积极参与公共事务都是很平常的事情。律师即使在成为法官、政府或者私人企业集团的雇员或者法律教师之后仍然是律师协会的会员,他们可以辞掉这些其它事务,回头开始私人执业。为了在工商业中担任重要的执行职务而放弃执业的律师人数相对较少。这一职业中的流动性和公共责任感的一个例证是哈兰·菲斯克的职业生涯,他曾多次成为一名纽约州律师、一名教授和哥伦比亚法学院院长、美国总检察长和美国最高法院首席大法官。 律师并不按照职责进行正式的划分。在英国对诉讼律师和非诉律师的区分并没有移植到美国,既不存在拥有特别或者专有出庭权的职业群体,也没有专门制作法律文书的职业群体。美国律师的业务范围包括出庭辩护、咨询和起草文书。另外,在被广泛地成为“法律执业”的范围之内,律师的业务范围是专有性的,不对其他人开放。在出庭辩护领域,这种规则非常清楚:任何个人都可以代表其自己出庭,但除了一些基层法院之外,只有律师可以代表他人出庭。不过,律师不得代表他人参与一些行政机关设立的具有司法性质的正式程序当中。在咨询和起草法律文书领域的界限并不是太清晰,比如在在联邦所得税领域的法律执业和会计执业之间就是如此。但是,纽约最高法院的一个裁决表明了大多数美国法院的严格标准,该裁决认为,一个获准在外国执业单位获准在纽约执业的律师不得在纽约对客户提供法律咨询,即使该意见仅限于该律师获准执业的该外国的法律。但是,一个外国律师可能获准在一个州执业,而且无需获得许可便可以以一个外国法律顾问的身份向美国律师提供法律咨询。 1

相关主题