833 research outputs found

    Speech Acts Used by the Husband and Wife in the Reconciliation Processes in “Not Easily Broken”

    Full text link
    The writer researches the language use of husband and wife in their reconciliation processes and its connection to the reconciliation processes. She uses a film, entitled “Not Easily Broken” (2009) as the representative of reconciliation of husband and wife. She researches the Speech Act of Dave and Clarice during their reconciliation processes. The writer uses the Speech Act theory (Austin, 1962; Searle, 1969; Yule, 1996) and the reconciliation process (Huyse, 2003). Inthe findings of the research, the highest illocution is ‘Representative' and automatically, the highest perlocution is from ‘Representative'. In the first and second stages, most of the perlocution does not match but in the last stage, all perlocutions match to the illocution and the reconciliation is accomplished.The conclusion is a couple should accept the fact and truth to each other to accomplish reconciliation process

    Common Errors Found in the Use of Sentence Structure: a Case Study

    Full text link
    This study is done to find out: (1) the common errors in the use of sentence structure and (2) the similarities and differences on the types of errors in the use of sentence structure between original draft in the first topic, second topic, and third topic of Written English 4B class English Department in Petra Christian University. The writer chooses the theory of common errors in the use of sentence structure as proposed by Ho (2005). The findings of this study show that there are seven (7) out of eight (8) types of errors that occur in the students' drafts. Fragmented Sentence is the most common error made by the students in their drafts. In addition, there were similarities and differences on the types of errors and the frequency of occurrences of errors among the students. In conclusion, most of the students have understood about the use of sentence structure

    The Linguistic Repertoire of a Young Adult, and a Middle Adult of a Ngaju Dayaknese Family in Central Kalimantan

    Full text link
    This study is a qualitative study about linguistic repertoire and the subjects are three people from three different ages of a Ngaju Dayaknese family consisting of the mother, the first child and the third child. This study was conducted in order to see the linguistic repertoire of them. In order to reach the research objectives, I used the theories of linguistic repertoire by Milroy and Milroy (1990) and code choice by Holmes (2001). From my study, I found that the linguistic repertoire of the third child is Banjarese language, Indonesian language, and Ngaju Dayaknese language, the linguistic repertoire of the first child is Ngaju Dayaknese language, Indonesian language, and Banjarese language, and the linguistic repertoire of the mother is Ngaju Dayaknese language, Banjarese language, and Indonesian language. It can be concluded that the linguistic repertoire of each subject can be distinguished one from another and it was influenced by the environment he/she was exposed to

    The Choice of Codes Used by Two Announcers of Dj Fm and Ss Fm Radio Stations in Their Advertisements

    Full text link
    This thesis is a study of the choice of codes used by the announcers of DJ FM and SS FM radios in their advertisements, consisting of twenty advertisements from both radios. I applied some theories of codes from Wardaugh (2006), Stockwell (2002), and Holmes (2001) as my main theories. Also, I used the theory of Age and Linguistic choice from Coulmas (2005), and Marketing and Language Choice from Victor (2007) as my supporting theories. The subjects are two announcers of DJ FM and SS FM radios which are in the phase of young adulthood. Furthermore, I found that the announcers from both radio stations used Standard Indonesia as their main code. The conclusion is the target audience of DJ FM and SS FM did not influence the way the announcers chose their codes

    Interruptions Produced by the Mollucan Students in the Fellowship Meeting

    Full text link
    This thesis is about a study of the interruptions produced by the Moluccan students in a fellowship meeting, consisting of fifteen students as the respondents, who are divided into two: the chairperson and the members. The purposes of the study are to know the tokens and the functions of interruptions used by the chairperson and the members of the meeting by considering social role as the social factor. The writer applies the theory of interruptions by Tannen (1990) and Wardhaugh (1985) as the main theories. Besides, the writer also uses the theory of social role by Johnstone (2008) and the theory of discourse markers by Schiffrin (2003) as the supporting theories. The writer used qualitative approach to conduct this research. The writer discovered that the chairperson produced more tokens (19) than the members (13). Moreover, the writer found that the respondents produced Ambonese tokens, such as “Hiii”, “Weee”, “Seng”, “Eee”, and Suroboyoan tokens, such as “Lho” and “Itulho”. Both the chairperson and the members produced “other” functions the most with 58.75% and 63.81%. In conclusion, social role influenced the interruptions and their functions, and the number of tokens produced by the participants

    The Initiating Acts Used by the Host of Talk Indonesia in Political and Cultural Issues

    Full text link
    The writers observed the initiating acts used by the host of Talk Indonesia in political issues and cultural issues and the comparison of initiating acts between those two issues. The data was taken from several episodes of the Talk Indonesia that have topics on political and cultural issues. In the findings, the writers found that the highest percentage of initiating acts types in political issues is Inform (37%), and the lowest percentage is Action Request (1%), whereas, the highest percentage of initiating acts types in cultural issues is Inform (39%) and the lowest percentages are Polarity Questions (1%) and Action Requests (1%). The writer also found that in general, the percentage of Statement in the political issues (54%) is lower than those in the cultural issues (73%) while the percentage of Questions in the political issues (41%) is higher than those in the cultural issues (26%). The conclusion drew that different issues trigger different initiating act

    Effect of Heat Treatment Temperature on Tensile Strenght through Welding of Mild Carbon Steel

    Get PDF
    This study aims to explain how much the tensile strength of mild steel welding without heat treatment and with heat treatment and to explain how much influence the variation of heat treatment temperature of mild steel welding results on the tensile strength. The method used is the experimental method, namely by conducting experiments in the laboratory, taking data directly on the object to be observed then recording the required data in the form of the initial length of the specimen, the length of the specimen after breaking, the diameter of the initial specimen, the diameter of the specimen after breaking and maximum load. The results showed that the tensile strength value of the mild steel welding without heat treatment was 27.07 kgf/mm2, the tensile strength of the specimen welded by heat treatment at a temperature of 5000C was 29.08 kgf/mm2, at a temperature of 6000C was 35.17 kgf/mm2 and at 7000C the tensile strength is 40.06 kgf/mm2

    Safety alarms at CERN

    Get PDF
    In order to operate the CERN accelerators complex safely, the acquisition, transport and management of safety alarms is of crucial importance. The French regulatory authority [Direction de Sûreté des Installations Nucléaires de Base (INB)] defines them as Level 3 alarms; they represent as such a danger for the life and require an immediate intervention of the Fire Brigade. Safety alarms are generated by fire and flammable gas detection systems, electrical emergency stops, and other safety related systems. Level 3 alarms are transmitted for reliability reasons to their operation centre: the CERN Safety Control Room (SCR) using two different media: the hard-wired network and a computer based system. The hard-wired networks are connected to local panels summarizing in 34 security areas the overall CERN geography. The computer based system offers data management facilities such as alarm acquisition, distribution, archiving and information correlation. The Level 3 alarms system is in constant evolution in order to achieve better reliability and to integrate new safety turn-key systems provided by industry
    • 

    corecore