From 1678abc8d4a032891d016411dad231bd55ca30d1 Mon Sep 17 00:00:00 2001 From: Thierry Vignaud Date: Mon, 23 Aug 2004 03:02:06 +0000 Subject: aspell's typo fixes --- perl-install/standalone/harddrake2 | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'perl-install/standalone/harddrake2') diff --git a/perl-install/standalone/harddrake2 b/perl-install/standalone/harddrake2 index b33f445f3..9fa2408b9 100755 --- a/perl-install/standalone/harddrake2 +++ b/perl-install/standalone/harddrake2 @@ -75,13 +75,13 @@ my %fields = "hlt_bug" => [ N("Halt bug"), N("Some of the early i486DX-100 chips cannot reliably return to operating mode after the \"halt\" instruction is used") ], "level" => [ N("Level"), N("sub generation of the cpu") ], - "model" => [ N("Model"), N("generation of the cpu (eg: 8 for PentiumIII, ...)") ], + "model" => [ N("Model"), N("generation of the cpu (eg: 8 for Pentium III, ...)") ], "model name" => [ N("Model name"), N("official vendor name of the cpu") ], "name" => [ N("Name"), N("the name of the CPU") ], "processor" => [ N("Processor ID"), N("the number of the processor") ], "stepping" => [ N("Model stepping"), N("stepping of the cpu (sub model (generation) number)") ], "vendor_id" => [ N("Vendor"), N("the vendor name of the processor") ], - "wp" => [ N("Write protection"), N("the WP flag in the CR0 register of the cpu enforce write proctection at the memory page level, thus enabling the processor to prevent unchecked kernel accesses to user memory (aka this is a bug guard)") ], + "wp" => [ N("Write protection"), N("the WP flag in the CR0 register of the cpu enforce write protection at the memory page level, thus enabling the processor to prevent unchecked kernel accesses to user memory (aka this is a bug guard)") ], }, FLOPPY => { @@ -154,7 +154,7 @@ my ($current_device, $current_class, $current_configurator); my %menus = ( 'options' => - #-PO: please keep all "/" charaters !!! + #-PO: please keep all "/" characters !!! N("/_Options"), 'help' => N("/_Help") ); -- cgit v1.2.1