alternate -> alternative, per PR 2643

This commit is contained in:
mouse 1997-03-08 14:02:43 +00:00
parent 0ad6f5d6d5
commit 75e150fc56
10 changed files with 20 additions and 20 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: ep.4,v 1.13 1997/02/24 00:09:29 jonathan Exp $
.\" $NetBSD: ep.4,v 1.14 1997/03/08 14:02:43 mouse Exp $
.\"
.\" Copyright (c) 1997 Jonathan Stone
.\" All rights reserved.
@ -103,7 +103,7 @@ UTP, also known as twisted pair
The
.Nm
driver defaults to using the BNC port.
To choose an alternate port,
To choose an alternative port,
use the following flag combinations with
.Xr ifconfig 8
or in your /etc/hostname.ep? file.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: iy.4,v 1.4 1997/02/24 00:01:51 jonathan Exp $
.\" $NetBSD: iy.4,v 1.5 1997/03/08 14:03:49 mouse Exp $
.\"
.\" Copyright (c) 1994 Herb Peyerl
.\" All rights reserved.
@ -57,7 +57,7 @@ UTP, also known as twisted pair
.Pp
The default port to use is the port the card autodetects at
.Xr ifconfig up
time. To choose an alternate port,
time. To choose an alternative port,
use the following flag combinations with
.Xr ifconfig 8
or in your /etc/hostname.iy? file.

View File

@ -1,4 +1,4 @@
.\" $NetBSD: kg.4,v 1.3 1996/03/03 17:13:46 thorpej Exp $
.\" $NetBSD: kg.4,v 1.4 1997/03/08 14:05:51 mouse Exp $
.\"
.\" Copyright (c) 1983, 1991 Regents of the University of California.
.\" All rights reserved.
@ -48,7 +48,7 @@ A
.Tn KL-11
or
.Tn DL-11W
can be used as an alternate real
can be used as an alternative real
time clock
source. When configured, certain system
statistics and, optionally, system profiling work

View File

@ -1,4 +1,4 @@
.\" $NetBSD: termios.4,v 1.7 1997/01/30 07:15:49 mikel Exp $
.\" $NetBSD: termios.4,v 1.8 1997/03/08 14:06:39 mouse Exp $
.\"
.\" Copyright (c) 1991, 1992, 1993
.\" The Regents of the University of California. All rights reserved.
@ -1157,7 +1157,7 @@ is off */
.It Dv ICANON
/* canonicalize input lines */
.It Dv ALTWERASE
/* use alternate
/* use alternative
.Dv WERASE
algorithm */
.It Dv IEXTEN

View File

@ -1,4 +1,4 @@
.\" $NetBSD: tp.4,v 1.5 1996/11/11 00:04:56 lukem Exp $
.\" $NetBSD: tp.4,v 1.6 1997/03/08 14:07:09 mouse Exp $
.\"
.\" Copyright (c) 1990, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -124,7 +124,7 @@ the June 1986 version of
8073.
Class 4 of the protocol provides reliable, sequenced,
flow-controlled, two-way
transmission of data packets with an alternate stop-and-wait data path called
transmission of data packets with an alternative stop-and-wait data path called
the "expedited data" service.
Class 0 is essentially a null transport protocol, which is used
when the underlying network service provides reliable, sequenced,

View File

@ -1,4 +1,4 @@
.\" $NetBSD: a.out.5,v 1.8 1994/11/30 19:31:09 jtc Exp $
.\" $NetBSD: a.out.5,v 1.9 1997/03/08 14:09:00 mouse Exp $
.\"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -103,7 +103,7 @@ The fields have the following functions:
.Bl -tag -width a_trsize
.It Fa a_midmag
This field is stored in network byte-order so that binaries for
for machines with alternate byte orders can be distinguished.
for machines with alternative byte orders can be distinguished.
It has a number of sub-components accessed by the macros
.Dv N_GETFLAG() ,
.Dv N_GETMID() , and

View File

@ -1,4 +1,4 @@
.\" $NetBSD: stab.5,v 1.3 1994/11/30 19:31:33 jtc Exp $
.\" $NetBSD: stab.5,v 1.4 1997/03/08 14:09:45 mouse Exp $
.\"
.\" Copyright (c) 1980, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -151,7 +151,7 @@ uses the following n_type values:
#define N_LSYM 0x80 /* local sym: name,,0,type,offset */
#define N_SOL 0x84 /* #included file name: name,,0,0,address */
#define N_PSYM 0xa0 /* parameter: name,,0,type,offset */
#define N_ENTRY 0xa4 /* alternate entry: name,linenumber,address */
#define N_ENTRY 0xa4 /* alternative entry: name,linenumber,address */
#define N_LBRAC 0xc0 /* left bracket: 0,,0,nesting level,address */
#define N_RBRAC 0xe0 /* right bracket: 0,,0,nesting level,address */
#define N_BCOMM 0xe2 /* begin common: name,, */

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mailaddr.7,v 1.3 1994/11/30 19:07:17 jtc Exp $
.\" $NetBSD: mailaddr.7,v 1.4 1997/03/08 14:10:39 mouse Exp $
.\"
.\" Copyright (c) 1983, 1987, 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@ -52,7 +52,7 @@ example, a valid address is:
.Pp
Unlike some other forms of addressing, domains do not imply any routing.
Thus, although this address is specified as an Internet address, it might
travel by an alternate route if that were more convenient or efficient.
travel by an alternative route if that were more convenient or efficient.
For example, at Berkeley, the associated message would probably go directly
to CS over the Ethernet rather than going via the Berkeley Internet
gateway.

View File

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)crash.8 5.2 (Berkeley) 3/16/91
.\" $Id: crash.8,v 1.2 1993/08/01 07:55:13 mycroft Exp $
.\" $Id: crash.8,v 1.3 1997/03/08 14:11:55 mouse Exp $
.\"
.Dd March 16, 1991
.Dt CRASH 8
@ -75,7 +75,7 @@ This cryptic panic message results from a failure to mount the root filesystem
during the bootstrap process.
Either the root filesystem has been corrupted,
or the system is attempting to use the wrong device as root filesystem.
Usually, an alternate copy of the system binary or an alternate root
Usually, an alternative copy of the system binary or an alternative root
filesystem can be used to bring up the system to investigate.
.Pp
.It Sy "Can't exec /etc/init"

View File

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)crash.8 6.5 (Berkeley) 4/20/91
.\" $Id: crash.8,v 1.2 1993/08/01 07:34:45 mycroft Exp $
.\" $Id: crash.8,v 1.3 1997/03/08 14:12:40 mouse Exp $
.\"
.TH CRASH 8 "April 20, 1991"
.UC 4
@ -73,7 +73,7 @@ This cryptic panic message results from a failure to mount the root filesystem
during the bootstrap process.
Either the root filesystem has been corrupted,
or the system is attempting to use the wrong device as root filesystem.
Usually, an alternate copy of the system binary or an alternate root
Usually, an alternative copy of the system binary or an alternative root
filesystem can be used to bring up the system to investigate.
.TP
.B Can't exec /sbin/init