summaryrefslogtreecommitdiffstats
path: root/perl-install/standalone/harddrake2
diff options
context:
space:
mode:
authorThierry Vignaud <tvignaud@mandriva.org>2004-08-23 03:02:06 +0000
committerThierry Vignaud <tvignaud@mandriva.org>2004-08-23 03:02:06 +0000
commit1678abc8d4a032891d016411dad231bd55ca30d1 (patch)
tree00b35ecb304bb58d4213dcdc81d1866e1a3ac081 /perl-install/standalone/harddrake2
parent8ad006ef969c3a18cd41f2a6ec96dec8cee74b89 (diff)
downloaddrakx-1678abc8d4a032891d016411dad231bd55ca30d1.tar
drakx-1678abc8d4a032891d016411dad231bd55ca30d1.tar.gz
drakx-1678abc8d4a032891d016411dad231bd55ca30d1.tar.bz2
drakx-1678abc8d4a032891d016411dad231bd55ca30d1.tar.xz
drakx-1678abc8d4a032891d016411dad231bd55ca30d1.zip
aspell's typo fixes
Diffstat (limited to 'perl-install/standalone/harddrake2')
-rwxr-xr-xperl-install/standalone/harddrake26
1 files changed, 3 insertions, 3 deletions
diff --git a/perl-install/standalone/harddrake2 b/perl-install/standalone/harddrake2
index b33f445f3..9fa2408b9 100755
--- a/perl-install/standalone/harddrake2
+++ b/perl-install/standalone/harddrake2
@@ -75,13 +75,13 @@ my %fields =
"hlt_bug" => [ N("Halt bug"),
N("Some of the early i486DX-100 chips cannot reliably return to operating mode after the \"halt\" instruction is used") ],
"level" => [ N("Level"), N("sub generation of the cpu") ],
- "model" => [ N("Model"), N("generation of the cpu (eg: 8 for PentiumIII, ...)") ],
+ "model" => [ N("Model"), N("generation of the cpu (eg: 8 for Pentium III, ...)") ],
"model name" => [ N("Model name"), N("official vendor name of the cpu") ],
"name" => [ N("Name"), N("the name of the CPU") ],
"processor" => [ N("Processor ID"), N("the number of the processor") ],
"stepping" => [ N("Model stepping"), N("stepping of the cpu (sub model (generation) number)") ],
"vendor_id" => [ N("Vendor"), N("the vendor name of the processor") ],
- "wp" => [ N("Write protection"), N("the WP flag in the CR0 register of the cpu enforce write proctection at the memory page level, thus enabling the processor to prevent unchecked kernel accesses to user memory (aka this is a bug guard)") ],
+ "wp" => [ N("Write protection"), N("the WP flag in the CR0 register of the cpu enforce write protection at the memory page level, thus enabling the processor to prevent unchecked kernel accesses to user memory (aka this is a bug guard)") ],
},
FLOPPY =>
{
@@ -154,7 +154,7 @@ my ($current_device, $current_class, $current_configurator);
my %menus = (
'options' =>
- #-PO: please keep all "/" charaters !!!
+ #-PO: please keep all "/" characters !!!
N("/_Options"),
'help' => N("/_Help")
);