For the last article in this American & British English series, we turn to a vocabulary set that evolved after America achieved independence from the UK, and as such has many differences: motor vehicle parts.
In American English, the fender frames the wheel well, preventing mud or rocks being thrown up by the rapidly turning tire. It is the source of the term “fender bender,” meaning a minor accident. In British English, the fender is called the “wing.”
In the UK, before cars were invented, one main form of transport was the horse-drawn carriage. The driver would store his boots in the “boot locker,” and over time this phrase would be shortened to the “boot.” In the US in the past, the main storage space was a trunk attached to the back of the car. Over time, storage space was integrated into the back of the car, and became known as the trunk. In British English, this space is called the “boot.”
The metal part covering the engine is named after soft coverings for the head: “hood” in American English, from the Old English word hod, related to the Dutch hoed (hat), and “bonnet” in British English, from the Old French word bonet (cloth used as a headdress).
(Paul Cooper, Taipei Times)
在「美式英文與英式英文」的最後一個單元,我們要介紹一組詞彙:汽車零件。這些詞彙是在美國脫離英國獨立後演變而來的,因此有許多差異。
在美式英文中,「fender」(擋泥板)包住了輪艙(wheel well),防止快速旋轉的輪胎讓泥沙或石子飛濺出來。它是「fender bender」一詞的來源,表示擦撞、小車禍事故。英式英文則稱擋泥板為「wing」。
在英國,汽車尚未發明時的主要運輸工具是馬車。駕車的人將其靴子放在靴子櫃(boot locker)中,久而久之,該片語縮短為「boot」。過去美國的汽車,其主要置物空間是裝在車子後面的大行李箱(trunk)。後來,置物空間被整合到汽車的後部,並稱為「trunk」(後車箱)。英式英文則稱後車箱為「boot」。
金屬製的引擎蓋,其美式英文名稱卻是來自柔軟的衣物──風帽(hood),源於古英語字「hod」,與荷蘭文「hoed」(帽子)有關。引擎蓋在英式英文中稱為「bonnet」,源自古法語字「bonet」(用作頭巾的布)。
(台北時報林俐凱譯)
When you think of the Netherlands, images of tulips, windmills, and iconic wooden shoes — known as “Dutch clogs” — may come to mind. These traditional shoes are rich in cultural significance. For centuries, Dutch clogs have been admired for their sturdy design and impressive craftsmanship, making them a fascinating symbol of Dutch heritage. Dutch clogs date back to the Middle Ages. During that time, farmers and laborers needed durable shoes to cope with the region’s damp and unpredictable climate and topography. Crafted from solid wood, such as willow or poplar, clogs offered outstanding protection. Their firm structure kept
Bilingual Story is a fictionalized account. 雙語故事部分內容純屬虛構。 “One DA-BEI... WU LONG... NAI?” Yujing smiled as the foreigner struggled to order. He looked like an embarrassed puppy. She repeated the order in Chinese, then English: “Oolong milk tea, large size. Half sweet, no ice?” she said gently. He beamed — the kind of full-face, sunshine smile that Latinos are famous for. “Yes! That! You are... lo maximo… the best!” After he left, Lily nudged her. “Nice save. You’re getting the hang of it.” Yujing had taken this summer job at the bubble tea shop to build confidence and get work
A: The news says comic superstar Snoopy’s birthday is coming soon on Aug. 10. B: So he’s a Leo, and his birthday will fall on this Sunday. A: Cartoonist Charles Schulz created the comic strip Peanuts, featuring Snoopy, in 1950. And this year marks the character’s 75th anniversary. B: No wonder there are some big celebrations in Japan, Hong Kong and elsewhere. How about Taiwan? A: The “How Do You Do, Snoopy?” exhibition is taking place in Taipei. Let’s go to Shin Kong Mitsukoshi Department Store’s A11 branch to see the show. A: 新聞說,卡通巨星史努比的生日是8月10日耶。 B: 原來史努比是獅子座,本週日就是他的生日。 A: 漫畫家查爾斯舒茲1950年在《花生》漫畫創造了該角色,今年正好歡慶75週年! B:
Although sending you an SMS (Short Message Service) verification code provides some security, many apps now use code-generating apps and two-factor authentication instead. But more recently, passkeys now use a biometric approach to logging in. Biometrics can offer an even more secure alternative. Following this trend, Google is reportedly planning to replace SMS verification codes with “QR code” scanning. SMS codes are currently used to verify user identity and prevent fraudsters from creating fake Gmail accounts to distribute spam. However, these codes present several challenges. They can be phished through suspicious links, and users may not always have access