Solved

Unusual Notes in Tenach

Posted on 2015-01-18
2
61 Views
Last Modified: 2015-01-29
Does anyone explain the meaning of the karnei para on Bemidbar 35:5 and Yehoshua 19:51.  I believe there are 16 of these in Tenach.  There are also meircha kefulahs in  Bereishis 27:25 and Bemidbar 32:42.  How do these notes help us understand the text?
0
Comment
Question by:AlHal2
2 Comments
 
LVL 24

Accepted Solution

by:
SunBow earned 50 total points
ID: 40569107
> Unusual Notes in Tenach, Does anyone explain ...

Answer: No (or dunno)
I think it rather undoable for too many reasons, for one it is very old, meaning hard to adapt and translate, while it also must deal with that more ancient, all having issues of limited audience (such as peers having other things in common). Be that as it may, try

> the meaning of the karnei para

(it is not simple standalone, but part of a set)

see http://en.wikipedia.org/wiki/Karne_parah

"The rare trope sound in the Torah appears in Numbers 35:5 on the word B'amah (באמה, cubit), immediately following the word Alpayim (אלפים, two-thousand), on which an equally exclusive Yerach ben yomo is used, on the first of four occurrences of this phrase in the verse. In each of the phrase's four appearances, a different set of trope. The Yerach ben yomo followed by the Karne Parah is found on the first of these four instances. On the other three, respectively, are a Kadma V'Azla, a Munach Rivi'i, and a Mercha Tipcha."

> here are also meircha kefulahs

While there are different opinions, here is one that makes more sense:



mercha kfula:
            not neutral
Example:

Neutral:
            not commanded to (do)
Not neutral:
            commanded to not (do)


> How do these notes help us understand the text?

<um> dropping in an accentuation to reduce level of monotony (sleepy-time) ... while attempting to retranslate to more widespread level of common understanding
0
 

Author Closing Comment

by:AlHal2
ID: 40577015
Thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Experts-Exchange is designed for questions and answers with the common scenario being that nearly all responses are directed to the Asker.   But in some EE zones, it is common to have a number of different people discussing back and forth.  In such …
The Qur’an Revelation There has been a lot of public focus and debate on Islam in various media in recent years. This article aims to clarify some elements towards the understanding of the primary source of Islamic belief, the Qur’an. Defini…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now