aboutsummaryrefslogtreecommitdiffstats
path: root/doc/gawkinet.texi
diff options
context:
space:
mode:
authorArnold D. Robbins <arnold@skeeve.com>2010-07-16 14:49:57 +0300
committerArnold D. Robbins <arnold@skeeve.com>2010-07-16 14:49:57 +0300
commit6a2caf2157d87b4b582b2494bdd7d6a688dd0b1f (patch)
tree9a2862cc11be4832f188cfbdce175120ceba5024 /doc/gawkinet.texi
parent315bd501ca696bc3e3c938b4604d8dac7a6f512f (diff)
downloadegawk-6a2caf2157d87b4b582b2494bdd7d6a688dd0b1f.tar.gz
egawk-6a2caf2157d87b4b582b2494bdd7d6a688dd0b1f.tar.bz2
egawk-6a2caf2157d87b4b582b2494bdd7d6a688dd0b1f.zip
Move to gawk-3.1.6.
Diffstat (limited to 'doc/gawkinet.texi')
-rw-r--r--doc/gawkinet.texi16
1 files changed, 8 insertions, 8 deletions
diff --git a/doc/gawkinet.texi b/doc/gawkinet.texi
index 9ddabc04..f1b66073 100644
--- a/doc/gawkinet.texi
+++ b/doc/gawkinet.texi
@@ -152,7 +152,7 @@ version 3.1 and later.
@menu
* Preface:: About this document.
-* Introduction:: About networkiing.
+* Introduction:: About networking.
* Using Networking:: Some examples.
* Some Applications and Techniques:: More extended examples.
* Links:: Where to find the stuff mentioned in this
@@ -240,7 +240,7 @@ March, 2001
@node Introduction, Using Networking, Preface, Top
@chapter Networking Concepts
-This @value{CHAPTER} provides a (necessarily) brief intoduction to
+This @value{CHAPTER} provides a (necessarily) brief introduction to
computer networking concepts. For many applications of @command{gawk}
to TCP/IP networking, we hope that this is enough. For more
advanced tasks, you will need deeper background, and it may be necessary
@@ -1008,7 +1008,7 @@ look like this:
@ignore
@multitable {1234567890123} {1234567890123} {123456789012345678901234567890123456789012}
@item Service @strong{name} @tab Service @strong{number}
-@item echo @tab 7/tcp @tab echo sends back each line it receivces
+@item echo @tab 7/tcp @tab echo sends back each line it receives
@item echo @tab 7/udp @tab echo is good for testing purposes
@item discard @tab 9/tcp @tab discard behaves like @file{/dev/null}
@item discard @tab 9/udp @tab discard just throws away each line
@@ -1071,7 +1071,7 @@ services are switched off in some startup script. Systems running some
flavor of Microsoft Windows usually do @emph{not} support these services.
Nevertheless, it @emph{is} possible to do networking with @command{gawk} on
Microsoft
-Windows.@footnote{Microsoft prefered to ignore the TCP/IP
+Windows.@footnote{Microsoft preferred to ignore the TCP/IP
family of protocols until 1995. Then came the rise of the Netscape browser
as a landmark ``killer application.'' Microsoft added TCP/IP support and
their own browser to Microsoft Windows 95 at the last minute. They even back-ported
@@ -4476,7 +4476,7 @@ Now, let us look at the result. It begins with an HTTP header, which you
can ignore. Then there are some comments about the query having been
filtered to avoid spuriously high scores. After this, there is a reference
to the paper that describes the software being used for searching the data
-base. After a repitition of the original query's description we find the
+base. After a repetition of the original query's description we find the
list of significant alignments:
@smallexample
@@ -4497,7 +4497,7 @@ This means that the query sequence was found in seven human chromosomes.
But the value 0.20 (20%) means that the probability of an accidental match
is rather high (20%) in all cases and should be taken into account.
You may wonder what the first column means. It is a key to the specific
-database in which this occurence was found. The unique sequence identifiers
+database in which this occurrence was found. The unique sequence identifiers
reported in the search results can be used as sequence retrieval keys
via the NCBI server. The syntax of sequence header lines used by the NCBI
BLAST server depends on the database from which each sequence was obtained.
@@ -4581,7 +4581,7 @@ on the Internet.
@item
While Waterman's book can explain to you the algorithms employed internally
-in the database search engines, most practicioners prefer to approach
+in the database search engines, most practitioners prefer to approach
the subject differently. The applied side of Computational Biology is
called Bioinformatics, and emphasizes the tools available for day-to-day
work as well as how to actually @emph{use} them. One of the very few affordable
@@ -5092,7 +5092,7 @@ permission from their copyright holders, but you may include
translations of some or all Invariant Sections in addition to the
original versions of these Invariant Sections. You may include a
translation of this License, and all the license notices in the
-Document, and any Warrany Disclaimers, provided that you also include
+Document, and any Warranty Disclaimers, provided that you also include
the original English version of this License and the original versions
of those notices and disclaimers. In case of a disagreement between
the translation and the original version of this License or a notice