Ôèëîëîãè÷åñêèå íàóêè/4.

Ñèíòàêñèñ: ñòðóêòóðà,ñåìàíòèêà,ôóíêöèÿ

Êðûæàê Î.Þ.

Íàöèîíàëüíûé òåõíè÷åñêèé óí³âåðñèòåò Óêðàèíû «Êèåâñêèé ïîëèòåõíè÷åñêèé èíñòèòóò»

THE MAIN WAYS OF FORMING COMPUTER NEOLOGISMS

     Word-Formation is a constant way of replenishment of any language and sublanguage by lexical means, which gives the most significant results in terms of quantity, and, of course, it needs a separate and detailed consideration.

     1. Affixation

     New prefix info- (short form of the word information) is widely used for the formation of computer neologisms: infobahn, infoglut, infomediary, infomonger, infonaut, infostructure, infowar, infoworld.

“One explanation for this is that Russia Today has been infiltrated by Western infowar specialists who are trying to discredit it with kooky programming.” [4]

Highly productive affixoids techno-, tele- are used to a significant extent. Element techno (tech) is widely used for introducing concepts associated with modern, especially computer equipment (technonerd, technohead, technomanager), element tele- also takes part in the creation of derivatives related to computers and telecommunications (telecommuting, teledemocracy, telemedicine).

“The idea was something more like a house party for serious technoheads, Piotr Orlov, a D.J. who started Treehouse with two 30-something friends, wrote in an e-mail message.”[5]

     Till the end of the eighties affixoid cyber- (part of the word cybernetics) functioned in English within a small number of words. "Cyberneologisms" poured in English in 90 years due to the increasing role of the Internet. British linguist M.Quinion called such explosion of neologisms “cyberplague”.

     Element cyber, along with a general meaning associated with computersis more often used in a more narrow sense of “connected to the Internet” (cybercash, cybercommuter, cybersurf).

Cybercash, one of the pioneers in the field, filed for bankruptcy protection earlier this year.” [9]

     Prefix e-, formed from the word electronic, is considered to be a new cyber- and is more common in modern English: e-banking, e-book, e-cash, e-business, e-shop, e-mail.

“For years, giving away free content and services has been the standard e-business model.” [6]

     As the basis for many neologisms a shortened version of the word Internet – the Net is also frequently used, for example: nethead, netmyth, netsavvy.

“Babbage noted in November that the block had not deterred Facebook from advertising for staff to push forward its brand in the net-savvy nation.” [4]

     Prefixes of Latin origin are also widely used in the formation of computer terms: inter- super-, mini-, macro-, micro-, auto-, multi-, mega-:

interactive, minidriver, superuser, macrocommand, microfile, autodump, multisystem, megaword.

“Roosegaarde and his team have long been fascinated by the notion of technology and electricity combining to create more interactive and open environments.” [7]

     Prefix re- is characterized by the highest frequency of use with a meaning of repeated action (in such terms as råñîðó, recreate, reformat)

     2. Conversion

     Conversion is the formation of new words by transferring from one part of speech to another. In terminological lexicon the most productive are two schemes:

1. VN (Substantivization):

Abort (ï.)premature discontinuing of the program (from abort (v.) – to stop a program or function before it has finished naturally).

“If a Word document is being copied from a local or network volume to removable media, then it must be encrypted and prompt the user to encrypt the removable media or abort the operation.” [8]

2. N→V (Verbalization):

Pirate (v.) – to sell or transmit stolen “intellectual property” (e.g. software, compact discs, etc.).

“The ultimate goal is to obtain so-called "zero-day warez," or software pirated on the same day it was released” [8]

     3. Word-Composition

     Word-composition is a combination of two or more stems in a single word-composite, which is distinguished by its wholeness.

Mass-mailingthe posting of advertising or similar material to a lot of people at one time.

Menu-driven A computer is operated by making choices from different menus rather than by giving separate instructions on a keyboard.

Workstationa keyboard and screen with which a person can use a computer system.

Context-free – a program that generates images from written instructions called a grammar.

Failsafe – something designed to work or function automatically to prevent breakdown of a mechanism, system, or the like.

Annoybot – a device or piece of software that can execute commands, reply to messages, or perform routine tasks, as online searches, either automatically or with minimal human intervention.

Hotlist – a collection of favourite or frequently used Web sites or those about a specific topic.

Vaxherd – operator of VAX.

Bar/mail – a sudden stream of mail.

Sneakernet – Term used (generally with ironic intent) for transfer of electronic information by physically carrying tape, disks, or some other media from one machine to another.

      4. Telescopy

     Computer neologisms, created by means of telescopy, can be divided into the following categories:

1. Types of computers and their components“Objects”

Transputer (transistor + computer) – a single microchip on which all the functions of an entire microprocessor are incorporated.

Penputer (pen + computer):

Penputer (pen + computer):

Hackintosh (hack+macintosh) a computer built to run Mac OS X.

2. A person associated with this sphere“Subject”

Compcierge (computer + concierge) – a hotel employee, who assists guests with a computer-related tasks and problems.

Hacktivist (hacker + activist) – hacker, using secret information with his own purposes.

Netizen (internet + citizen) – people who use the Internet to participate in or contribute to an Internet group or society.

3. Concepts related to the computer field – “Abstracts”

Compunication (computer + communication) – any form of computer-based communication, including e-mail, fax, voice mail.

Dataveillance (data + surveillance) – the ability to monitor a person’s activities by studying the data trail created by action.

Hackint (hacking + intelligence) – secret information, obtained by breaking into a computer system.


 

BIBLIOGRAPHY

1.     Ginzburg R.S. A course in modern English lexicology.- Moscow: Vysshaja Shkola, 1979.- 269 p.

2.     Ãðîìîâà Ì. Ëåêñè÷í³ òà ñèíòàêòèêî-ñòèë³ñòè÷í³ çì³íè â ñó÷àñí³é àíãë³éñüê³é ìîâ³: âïëèâ êîìï'þòåðíèõ òåõíîëîã³é [Òåêñò] / Ì. Ãðîìîâà, Ñ.Â. Áàðàíîâà // Ìàòåð³àëè íàóêîâî-òåîðåòè÷íî¿ êîíôåðåíö³¿ âèêëàäà÷³â, àñï³ðàíò³â, ñï³âðîá³òíèê³â òà ñòóäåíò³â ãóìàí³òàðíîãî ôàêóëüòåòó : 23-27 êâ³òíÿ 2007 ðîêó. - Ñóìè: ÑóìÄÓ, 2007. - ×.1. - Ñ.70-72.

3.     Æóë³íñüêà Ì.Î. Êîãí³òèâíà ñåìàíòèêà àíãë³éñüêèõ êîìï’þòåðíèõ íåîëîã³çì³â, óòâîðåíèõ øëÿõîì òåëåñêîﳿ.- Íàóêîâèé â³ñíèê Âîëèíñüêîãî íàö³îíàëüíîãî óí³âåðñèòåòó ³ìåí³ Ëåñ³ Óêðà¿íêè. Ñåð³ÿ: Ô³ëîëîã³÷í³ íàóêè.- 2008. - ¹ 2. – Ñ. 112-115.

4.     The Economist: http://www.economist.com/

5.     The New York Times: http://www.nytimes.com/

6.     Time: http://www.time.com/time/

7.      Newsweek/The Daily Beast: http://www.thedailybeast.com/newsweek.html

8.     Eweek: http://www.eweek.com/

9.     Business week: http://www.businessweek.com/