{"id":108,"date":"2016-01-30T21:52:00","date_gmt":"2016-01-31T02:52:00","guid":{"rendered":"https:\/\/www.ata-divisions.org\/JLD\/wp\/2016\/01\/30\/words-and-%e8%a8%80%e8%91%89-by-jim-davis-4\/"},"modified":"2016-01-30T21:52:00","modified_gmt":"2016-01-31T02:52:00","slug":"words-and-%e8%a8%80%e8%91%89-by-jim-davis-4","status":"publish","type":"post","link":"https:\/\/www.ata-divisions.org\/JLD\/2016\/01\/30\/words-and-%e8%a8%80%e8%91%89-by-jim-davis-4\/","title":{"rendered":"Words and \u8a00\u8449 by Jim Davis"},"content":{"rendered":"<p><\/p>\n<div align=\"center\" style=\"text-align: center;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">\u201cTwo Roads Diverged &#8230;\u201d:<\/span><\/b><\/div>\n<div align=\"center\" style=\"text-align: center;\"><span style=\"mso-bookmark: OLE_LINK64;\"><span style=\"mso-bookmark: OLE_LINK65;\"><span style=\"mso-bookmark: OLE_LINK67;\"><span style=\"mso-bookmark: OLE_LINK90;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Making Good Choices in Japanese-into-English Translation<\/span><\/b><\/span><\/span><\/span><\/span><\/div>\n<div align=\"center\" style=\"text-align: center;\"><span style=\"mso-bookmark: OLE_LINK64;\"><span style=\"mso-bookmark: OLE_LINK65;\"><span style=\"mso-bookmark: OLE_LINK67;\"><span style=\"mso-bookmark: OLE_LINK90;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">(Part 1)<\/span><\/b><\/span><\/span><\/span><\/span><\/div>\n<p><span style=\"mso-bookmark: OLE_LINK90;\"><\/span><span style=\"mso-bookmark: OLE_LINK67;\"><\/span><span style=\"mso-bookmark: OLE_LINK65;\"><\/span><span style=\"mso-bookmark: OLE_LINK64;\"><\/span> <\/p>\n<div align=\"center\" style=\"text-align: center;\"><\/div>\n<div><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">      <!--[if gte mso 9]><xml> <o:DocumentProperties>  <o:Revision>0<\/o:Revision>  <o:TotalTime>0<\/o:TotalTime>  <o:Pages>1<\/o:Pages>  <o:Words>33<\/o:Words>  <o:Characters>194<\/o:Characters>  <o:Company>Edwards Technical Language Services<\/o:Company>  <o:Lines>1<\/o:Lines>  <o:Paragraphs>1<\/o:Paragraphs>  <o:CharactersWithSpaces>226<\/o:CharactersWithSpaces>  <o:Version>14.0<\/o:Version> <\/o:DocumentProperties> <o:OfficeDocumentSettings>  <o:AllowPNG\/> <\/o:OfficeDocumentSettings><\/xml><![endif]--> <!--[if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:TrackMoves\/>  <w:TrackFormatting\/>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInval>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:DoNotPromoteQF\/>  <w:LidThemeOther>EN-US<\/w:LidThemeOther>  <w:LidThemeAsian>JA<\/w:LidThemeAsian>  <w:LidThemeComplexScript>X-NONE<\/w:LidThemeComplexScript>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>   <w:SplitPgBreakAndParaMark\/>   <w:EnableOpenTypeKerning\/>   <w:DontFlipMirrorIndents\/>   <w:OverrideTableStyleHps\/>   <w:UseFELayout\/>  <\/w:Compatibility>  <m:mathPr>   <m:mathFont m:val=\"Cambria Math\"\/>   <m:brkBin m:val=\"before\"\/>   <m:brkBinSub m:val=\"&#45;-\"\/>   <m:smallFrac m:val=\"off\"\/>   <m:dispDef\/>   <m:lMargin m:val=\"0\"\/>   <m:rMargin m:val=\"0\"\/>   <m:defJc m:val=\"centerGroup\"\/>   <m:wrapIndent m:val=\"1440\"\/>   <m:intLim m:val=\"subSup\"\/>   <m:naryLim m:val=\"undOvr\"\/>  <\/m:mathPr><\/w:WordDocument><\/xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" DefUnhideWhenUsed=\"true\"   DefSemiHidden=\"true\" DefQFormat=\"false\" DefPriority=\"99\"   LatentStyleCount=\"276\">  <w:LsdException Locked=\"false\" Priority=\"0\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Normal\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"heading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 9\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 9\"\/>  <w:LsdException Locked=\"false\" Priority=\"35\" QFormat=\"true\" Name=\"caption\"\/>  <w:LsdException Locked=\"false\" Priority=\"10\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Title\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" Name=\"Default Paragraph Font\"\/>  <w:LsdException Locked=\"false\" Priority=\"11\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtitle\"\/>  <w:LsdException Locked=\"false\" Priority=\"22\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Strong\"\/>  <w:LsdException Locked=\"false\" Priority=\"20\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"59\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Table Grid\"\/>  <w:LsdException Locked=\"false\" UnhideWhenUsed=\"false\" Name=\"Placeholder Text\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"No Spacing\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" UnhideWhenUsed=\"false\" Name=\"Revision\"\/>  <w:LsdException Locked=\"false\" Priority=\"34\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"List Paragraph\"\/>  <w:LsdException Locked=\"false\" Priority=\"29\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"30\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"19\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtle Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"21\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"31\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtle Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"32\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"33\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Book Title\"\/>  <w:LsdException Locked=\"false\" Priority=\"37\" Name=\"Bibliography\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" QFormat=\"true\" Name=\"TOC Heading\"\/> <\/w:LatentStyles><\/xml><![endif]--> <!--[if gte mso 10]><![endif]-->   <!--StartFragment-->   <!--EndFragment--><\/span><\/b><\/p>\n<div><span style=\"font-family: &quot;times&quot; , &quot;times new roman&quot; , serif;\">This is the first of four parts of a paper based on the standing-room-only presentation Jim gave at the 2015 ATA Conference in Miami entitled &#8220;Two Roads Diverged &#8230;&#8221;: Making Good Choices in Japanese-into-English Translation.<\/span><\/div>\n<p><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><\/span><\/b><br \/><a name='more'><\/a><\/p>\n<div style=\"text-align: left;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><br \/><\/span><\/b><\/div>\n<div style=\"text-align: left;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Introduction<\/span><\/b><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast;\">Every translator faces choices while working on a document. Some choices have serious consequences for the quality of the resulting translation. A \u201cgood\u201d translation results from a series of \u201cgood\u201d choices, but how does the translator know which choice is the \u201cright\u201d choice, the \u201cbest available\u201d choice, or even a \u201cgood\u201d choice? In order to make good choices the translator must have an understanding of individual words and phrases in both the source language and the target language, and the translator must have field-specific knowledge related to the content of the document. When a given word or phrase in the source language has multiple meanings in the target language, the translator must think carefully about context before choosing a particular meaning. The translator must also keep in mind the overall flow of information throughout the document. The content in different portions of the document must be mutually consistent, and word usage in later portions of the document should build upon information presented earlier in the document. In some cases the translator must combine information from multiple places in the source text; in other cases the translator must include information that is not present in the source text at all. The result of many good choices is a translation that is characterized by consistency in usage, content, and style; a translation that is an integrated whole; and a translation that conveys the intended meaning as accurately and in as natural a manner as possible. In this paper I will present guidelines for making good choices in Japanese-into-English translation, and I will discuss examples from a variety of fields to illustrate the use of those guidelines.<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><span style=\"mso-spacerun: yes;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Example 1<\/span><\/b><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The following headline appeared in a Japanese newspaper:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><u style=\"text-underline: thick;\"><span style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u30b5\u30a4\u30d0\u30fc\u5bfe\u7b56<\/span><\/u><span style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u3001\u30ab\u30ae\u63e1\u308b\u300c<span style=\"color: red;\">\u5584\u7389\u30cf\u30c3\u30ab\u30fc<\/span>\u300d<\/span><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><span style=\"mso-tab-count: 6;\">&nbsp; &nbsp;&nbsp;<\/span><\/span><span style=\"mso-bidi-font-size: 15.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">(1)<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The word <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5584\u7389<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> appears in a number of widely used terms, such as <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5584\u7389\u8b66\u5b98<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (\u201cgood cop,\u201d in the sense of \u201cgood cop-bad cop\u201d), <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5584\u7389\u30b3\u30ec\u30b9\u30c6\u30ed\u30fc\u30eb<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (\u201cgood cholesterol\u201d), and <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5584\u7389\u83cc<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (\u201cgood bacteria\u201d). For this reason many translators would instinctively render <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5584\u7389\u30cf\u30c3\u30ab\u30fc<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> as \u201cgood hacker.\u201d Although \u201cgood hacker\u201d is perfectly understandable and is used on some occasions, the dominant term in the cyber world is \u201cwhite-hat hacker.\u201d The opposite of <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5584\u7389\u30cf\u30c3\u30ab\u30fc<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> is <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u60aa\u7389\u30cf\u30c3\u30ab\u30fc<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">, which refers to a \u201cblack-hat hacker.\u201d There is even an annual information security conference known as \u201cBlack Hat USA.\u201d (The association of \u201cwhite hats\u201d with \u201cgood guys\u201d and and the association of \u201cblack hats\u201d with \u201cbad guys\u201d survive from their origin in American cowboy movies.) The term <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5bfe\u7b56<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> normally refers to \u201cmeasures\u201d that are taken either to achieve a desirable outcome (e.g., <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5b89\u5168\u5bfe\u7b56<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> are \u201csafety measures\u201d) or to prevent an undesirable<span style=\"mso-spacerun: yes;\">&nbsp; <\/span>outcome (e.g., <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u516c\u5bb3\u5bfe\u7b56<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> are \u201canti-pollution measures\u201d) or more generally to \u201ccountermeasures.\u201d In this particular instance we could consider <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u30b5\u30a4\u30d0\u30fc\u5bfe\u7b56<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> to be \u201ccountermeasures against cyber attacks\u201d or simply \u201ccyber countermeasures.\u201d If we consider the intended meaning of the entire headline, the following translations could be considered:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">\u201c<b style=\"mso-bidi-font-weight: normal;\">White-Hat Hackers<\/b>\u201d Hold the Key to <u style=\"text-underline: thick;\">Countermeasures against Cyber Attacks<\/u> <span style=\"mso-tab-count: 2;\">&nbsp;<\/span>(1a)<\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><br \/><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><u style=\"text-underline: thick;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">Cyber Countermeasures<\/span><\/u><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">: \u201c<b style=\"mso-bidi-font-weight: normal;\">White-Hat Hackers<\/b>\u201d Hold the Key<span style=\"mso-tab-count: 4;\">&nbsp;&nbsp;<\/span>(1b)<\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><br \/><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><span style=\"mso-spacerun: yes;\">&nbsp;<\/span>\u201c<b style=\"mso-bidi-font-weight: normal;\">White-Hat Hackers<\/b>\u201d are Key Players for <u style=\"text-underline: thick;\">Cybersecurity<\/u><span style=\"text-underline: thick;\"> <\/span><span style=\"mso-tab-count: 5;\">&nbsp; &nbsp;<\/span>(1c)<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">Option 1a incorporates all of the necessary information, but it is a bit long. Because this is a headline for a newspaper article, space may be limited, and brevity is desirable. Option 1b incorporates a colon and more closely matches the rhythm of the source text. Option 1c varies from the literal wording in two respects: the phrase <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u30ab\u30ae\u63e1\u308b<\/span><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"> (\u201chold the key\u201d) has become \u201care key players\u201d and the term <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u30b5\u30a4\u30d0\u30fc\u5bfe\u7b56<\/span><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"> (\u201ccyber countermeasures\u201d) has become \u201ccybersecurity.\u201d<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> The choice between \u201chold the key\u201d and \u201care key players\u201d is a matter of individual style, but the use of \u201ccybersecurity\u201d offers several advantages over \u201ccyber countermeasures.\u201d Not only is \u201ccybersecurity\u201d more concise, it is much less clumsy and is far more widely used. The process of considering and rejecting various options has led us to the following two choices, either of which could be used with confidence:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">\u201c<b style=\"mso-bidi-font-weight: normal;\">White-Hat Hackers<\/b>\u201d are Key Players for <u style=\"text-underline: thick;\">Cybersecurity<\/u><span style=\"text-underline: thick;\">&nbsp;<\/span><\/span><span style=\"mso-tab-count: 5;\">&nbsp;<\/span>(1c) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">\u201c<b style=\"mso-bidi-font-weight: normal;\">White-Hat Hackers<\/b>\u201d Hold the Key to <u style=\"text-underline: thick;\">Cybersecurity<\/u><span style=\"text-underline: thick;\">&nbsp;<\/span><\/span><span style=\"mso-tab-count: 5;\">&nbsp;&nbsp;<\/span>(1d) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><span style=\"mso-spacerun: yes;\">&nbsp;&nbsp; <\/span><span style=\"mso-spacerun: yes;\">&nbsp;&nbsp;&nbsp;<\/span><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Example 2<\/span><\/b><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The following paragraph appeared in the article under the headline that was used as Example 1:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u30b5\u30a4\u30d0\u30fc\u306e\u653b\u6483\u8005\u304c<u style=\"text-underline: dotted-heavy;\">\u99c6\u4f7f\u3059\u308b<\/u>\u306e\u306f\u3001<span style=\"color: red;\">\u30cd\u30c3\u30c8\u306e\u3082\u308d\u3055\u3092\u7a81\u304f<\/span>\u30cf\u30c3\u30ad\u30f3\u30b0\u6280\u8853\u3002<u style=\"text-underline: thick;\">\u3053\u308c\u306b\u5bfe\u6297\u3059\u308b<\/u>\u306b\u306f\u3001<u style=\"text-underline: dashed-heavy;\">\u5584\u7389\u306e\u30cf\u30c3\u30ab\u30fc\u306e\u624b<\/u>\u304c\u5fc5\u8981\u3060\u3002<\/span><span style=\"mso-tab-count: 5;\">&nbsp;&nbsp;<\/span>(2)<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp; <\/span><span style=\"mso-tab-count: 5;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Generally speaking, the term <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3082\u308d\u3055<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> refers to the \u201cfrailty,\u201d \u201cfragility,\u201d \u201cbrittleness,\u201d or \u201cvulnerability\u201d of something. In the context of the Internet, \u201cvulnerability\u201d is certainly the best choice. (The phrase \u201csecurity vulnerability\u201d produced over 750,000 hits on a recent Internet search.) The verb <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u7a81\u304f<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> has many meanings, but in this context \u201cto attack (something)\u201d or \u201cto take aim at (something)\u201d seems most reasonable. The noun <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u6280\u8853<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> could mean either \u201ctechnology\u201d or \u201ctechnique.\u201d In this context \u201ctechnique\u201d is the better option. For the first sentence we could say,<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">Cyber attackers<span style=\"color: blue;\"> <\/span><u style=\"text-underline: dotted-heavy;\">make good use of <\/u>hacking techniques that <b style=\"mso-bidi-font-weight: normal;\">attack\/take aim at the vulnerabilities of the Internet<\/b>.<span style=\"mso-tab-count: 1;\">&nbsp; &nbsp;<\/span><\/span><span style=\"mso-tab-count: 3;\">&nbsp;&nbsp;<\/span>(2a)<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp; <\/span><span style=\"mso-tab-count: 4;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><span style=\"mso-tab-count: 3;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">Cyber attackers <u style=\"text-underline: dotted-heavy;\">are well versed in<\/u> hacking techniques that <b style=\"mso-bidi-font-weight: normal;\">exploit\/target the weaknesses of the Internet<\/b>. <span style=\"mso-tab-count: 6;\">&nbsp; &nbsp; <\/span><\/span><span style=\"mso-tab-count: 5;\">&nbsp;&nbsp;<\/span>(2b)<span style=\"mso-tab-count: 6;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><span style=\"mso-tab-count: 5;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The pronoun <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3053\u308c<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> certainly means \u201cthis.\u201d However, as with any pronoun, in order to produce a good translation it is necessary to determine what noun is the antecedent. Because the text says we will <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u5bfe\u6297\u3059\u308b<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (\u201cfight back against,\u201d \u201cdefend against,\u201d \u201ccounter\u201d) this <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3053\u308c<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">, we recognize that <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3053\u308c<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> must be related to the attacks that were mentioned in the first sentence. In the hacker world the piece of software that is used in such an attack is known as an \u201cexploit.\u201d This is another alternative for <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3053\u308c<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">. Yet another option for <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3053\u308c<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> would be \u201cintrusion,\u201d which occurs each time an attack is mounted. The noun <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u624b<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> literally means \u201chand,\u201d but in this context <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u624b<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> refers to the effort or the ability of someone to do something. If we put everything together, the second sentence could be translated as follows:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">The <u style=\"text-underline: dashed-heavy;\">assistance of white-hat hackers<\/u> is necessary in order to <u style=\"text-underline: thick;\">fight back\/defend against such attacks\/exploits.<\/u><span style=\"mso-tab-count: 7;\">&nbsp;&nbsp;<\/span><\/span>(2c)<span style=\"mso-tab-count: 7;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><span style=\"mso-tab-count: 3;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">The <u style=\"text-underline: dashed-heavy;\">skills<\/u><u style=\"text-underline: dashed-heavy;\">of white-hat hackers<\/u> are essential in order to <u style=\"text-underline: thick;\">counter\/resist such intrusions.<\/u><\/span><span style=\"mso-tab-count: 12;\">&nbsp; &nbsp;<\/span>(2d)<\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><span style=\"mso-tab-count: 12;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><span style=\"mso-tab-count: 12;\"><br \/><\/span><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><b style=\"mso-bidi-font-weight: normal;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Example 3<\/span><\/b><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The following paragraph appeared later in the same article:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u300c\u81ea\u5206\u306f\u9ad8\u6821\u6642\u4ee3\u306b\u30d1\u30bd\u30b3\u30f3\u306b\u8208\u5473\u3092\u3082\u3063\u305f\u3053\u3068\u304c<u style=\"text-underline: dotted-heavy;\">\u304d\u3063\u304b\u3051<\/u><\/span><u style=\"text-underline: dotted-heavy;\"><span style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 12.0pt; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u3067<\/span><\/u><span style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt; mso-hansi-font-family: Times;\">\u3001<span style=\"color: red;\">\u624b\u5f53\u305f\u308a\u6b21\u7b2c<\/span>\u3001\u30b5\u30a4\u30d0\u30fc\u306e\u60c5\u5831\u3092<u style=\"text-underline: dashed-heavy;\">\u3042\u3055\u308a<\/u>\u3001<u style=\"text-underline: thick;\">\u72ec\u5b66\u3057\u305f<\/u>\u3002<u style=\"text-underline: dash-dot-heavy;\">\u30cf\u30c3\u30ab\u30fc\u306a\u3069\u306e\u6280\u8853<\/u>\u306b\u6559\u79d1\u66f8\u306f\u306a\u3044\u3002\u300d<\/span><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><span style=\"mso-tab-count: 2;\">&nbsp; &nbsp;<\/span>(3)<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">This quote came from someone who is (or was) a hacker. The word <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u304d\u3063\u304b\u3051<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> typically indicates a starting point. The first half of the first sentence could read, <\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">\u201cFor me <u style=\"text-underline: dotted-heavy;\">the starting poin<\/u><\/span><u style=\"text-underline: dotted-heavy;\"><span style=\"mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">t was<\/span><\/u><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">becoming interested in computers when I was in high school.<span style=\"mso-spacerun: yes;\">&nbsp; <\/span>(3a)<\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><br \/><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">\u201cFor me <u style=\"text-underline: dotted-heavy;\">the first st<\/u><\/span><u style=\"text-underline: dotted-heavy;\"><span style=\"mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">ep was<\/span><\/u><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">developing an interest in computers when I was in high school.<span style=\"mso-tab-count: 1;\">&nbsp;&nbsp; <\/span>(3b)<\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><br \/><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">\u201cFor me <u style=\"text-underline: dotted-heavy;\">it all starte<\/u><\/span><u style=\"text-underline: dotted-heavy;\"><span style=\"mso-bidi-font-size: 12.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">d when<\/span><\/u><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"> I developed an interest in computers during high school. <span style=\"mso-tab-count: 1;\">&nbsp;&nbsp;&nbsp;<\/span><span style=\"mso-spacerun: yes;\">&nbsp;&nbsp;<\/span>(3c)<span style=\"color: blue;\"><\/span><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">The first two options follow the structure of the original Japanese sentence. In the third option the combination of a noun phrase (\u201cthe starting point\u201d or \u201cthe first step\u201d) and the verb<span style=\"mso-spacerun: yes;\">&nbsp; <\/span>\u201cwas\u201d has been replaced by a clause. This type of substitution can be useful in order to vary sentence structure or to produce a shorter, more natural translation.<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The phrase <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u624b\u5f53\u305f\u308a\u6b21\u7b2c<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> suggests that some action is carried out in a random or haphazard fashion, rather than being conducted in a well-planned or well-organized manner. Key words that come to mind include \u201cwhatever,\u201d \u201chowever,\u201d and \u201cwherever.\u201d In this example the action is described by the verb <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u3042\u3055\u308b<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">, which usually means \u201cto search for (something),\u201d \u201cto scavenge for (something),\u201d or \u201cto scrounge for (something).\u201d In this instance that \u201csomething\u201d is <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u30b5\u30a4\u30d0\u30fc\u306e\u60c5\u5831<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (cyber-related information). If we combine these three units of meaning, the remainder of the first sentence could be translated like this:<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">I <u style=\"text-underline: dashed-heavy;\">poked around for<\/u> information related to cyber <b style=\"mso-bidi-font-weight: normal;\">wherever I could find it<\/b>, and I <u style=\"text-underline: thick;\">studied on my own<\/u>.<span style=\"mso-tab-count: 7;\">&nbsp;&nbsp;<\/span><\/span>(3d)<span style=\"mso-tab-count: 7;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><span style=\"mso-tab-count: 5;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">I <u style=\"text-underline: dashed-heavy;\">dug up<\/u> <b style=\"mso-bidi-font-weight: normal;\">whatever<\/b> cyber-related information <b style=\"mso-bidi-font-weight: normal;\">I could put my hands on<\/b>, and I<b style=\"mso-bidi-font-weight: normal;\"> <\/b><u style=\"text-underline: thick;\">learned on my own<\/u>.<span style=\"mso-tab-count: 7;\">&nbsp;&nbsp;<\/span><\/span>(3e)<span style=\"mso-tab-count: 7;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><span style=\"mso-tab-count: 5;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">I <u style=\"text-underline: dashed-heavy;\">scrounged around for<\/u> cyber-related information <b style=\"mso-bidi-font-weight: normal;\">any way I could<\/b>, and I <u style=\"text-underline: thick;\">taught myself<\/u>.<span style=\"mso-tab-count: 1;\">&nbsp; &nbsp;<\/span>(3f)<u style=\"text-underline: thick;\"><span style=\"color: blue;\"><\/span><\/u><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Any of these options would be acceptable, but the phrase \u201cI taught myself\u201d in option 3f suggests a greater focus on the self than would be the case with \u201cI studied on my own\u201d or \u201cI learned on my own.\u201d Keeping in mind the personality of someone who might become a hacker, this emphasis on self\u2014rather than the recognition of some external source of instruction\u2014might be more consistent with the \u201cvoice\u201d of the person who made the quote.<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">The final sentence in this paragraph includes the word <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u306a\u3069<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">. When a sentence contains <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u306a\u3069<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">, the translator needs to consider whether it is really necessary to translate the word (\u201c&#8230; and so on,\u201d \u201csuch as &#8230;\u201d) or whether the word can simply be ignored. In this instance we may ignore the word, but there are still a number of ways to express the relationship between <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u30cf\u30c3\u30ab\u30fc<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (\u201chacker\u201d) and <\/span><span lang=\"JA\" style=\"font-family: &quot;\uff4d\uff53 \u30b4\u30b7\u30c3\u30af&quot;; mso-ascii-font-family: Times; mso-bidi-font-size: 14.0pt; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast; mso-hansi-font-family: Times;\">\u6280\u8853<\/span><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"> (\u201ctechniques\u201d):<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">There are no textbooks for<span style=\"color: blue;\">&nbsp;<\/span><u style=\"text-underline: dash-dot-heavy;\">the techniques a hacker uses<\/u>.\u201d<span style=\"mso-tab-count: 4;\">&nbsp; &nbsp; &nbsp;<\/span>(3g)<span style=\"color: blue;\"><\/span><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"color: blue; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><span style=\"mso-tab-count: 4;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"color: blue; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\"><span style=\"mso-tab-count: 4;\">&#8230;<span style=\"color: blue;\">&nbsp;<\/span><\/span><\/span><u style=\"text-underline: dash-dot-heavy;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">the skills a hacker needs<\/span><\/u><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-theme-font: major-fareast; mso-font-kerning: 1.0pt;\">.\u201d<span style=\"mso-tab-count: 5;\">&nbsp;&nbsp;<\/span>(3h)<\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-tab-count: 4;\"><br \/><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"mso-tab-count: 4;\">&#8230;&nbsp;<\/span><u style=\"text-underline: dash-dot-heavy;\">becoming a hacker<\/u>.\u201d<span style=\"mso-tab-count: 6;\">&nbsp; &nbsp; &nbsp;&nbsp;<\/span>(3i)<\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Option 3i does not contain the word \u201ctechniques\u201d or a substitute, but the intended meaning of the source text is retained. It is worth remembering that we do not need to translate every word in order to remain faithful to the meaning of the source text.<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-bidi-font-size: 14.0pt; mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\"><span style=\"mso-spacerun: yes;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">(to be continued)<\/span><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><\/div>\n<\/div>\n<div>\n<div style=\"text-align: left;\"><span style=\"mso-fareast-font-family: &quot;\uff2d\uff33 \u30b4\u30b7\u30c3\u30af&quot;; mso-fareast-language: JA; mso-fareast-theme-font: major-fareast;\">Jim Davis is Professor and Director of the Technical Japanese Program in the Dept. of Engineering Professional Development at the University of Wisconsin-Madison.<\/span><\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u201cTwo Roads Diverged &#8230;\u201d: Making Good Choices in Japanese-into-English Translation (Part 1) This is the first of four parts of a paper based on the standing-room-only presentation Jim gave at the 2015 ATA Conference in Miami entitled &#8220;Two Roads Diverged &#8230;&#8221;: Making Good Choices in Japanese-into-English Translation. Introduction Every translator faces choices while working on [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[8,29,21],"tags":[],"_links":{"self":[{"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/posts\/108"}],"collection":[{"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/comments?post=108"}],"version-history":[{"count":0,"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/posts\/108\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/media?parent=108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/categories?post=108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ata-divisions.org\/JLD\/wp-json\/wp\/v2\/tags?post=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}