delete doubled words, e.g.: "the the" -> "the"

This commit is contained in:
Wolfram Schneider 1996-10-05 22:27:30 +00:00
parent c849957cb0
commit e83201b43a
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=18718
43 changed files with 105 additions and 61 deletions

View File

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)csh.1 8.1 (Berkeley) 6/8/93
.\" $Id$
.\" $Id: csh.1,v 1.2 1994/09/24 02:54:23 davidg Exp $
.\"
.EH 'USD:4-%''An Introduction to the C shell'
.OH 'An Introduction to the C shell''USD:4-%'
@ -617,7 +617,7 @@ order than we listed them above.
The
.I echo
command receives four words as arguments, even though we only typed
one word as as argument directly.
one word as an argument directly.
The four words were generated by
.I "filename expansion"
of the one input word.

View File

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)csh.2 8.1 (Berkeley) 6/8/93
.\" $Id$
.\" $Id: csh.2,v 1.2 1994/09/24 02:54:24 davidg Exp $
.\"
.nr H1 1
.NH
@ -1300,7 +1300,7 @@ One useful feature which is discussed later is the
built-in command which can be used to run the same command
sequence with a number of different arguments.
.PP
If you intend to use \s-2UNIX\s0 a lot you you should look through
If you intend to use \s-2UNIX\s0 a lot you should look through
the rest of this document and the csh manual pages (section1) to become familiar
with the other facilities which are available to you.
.bp

View File

@ -1,4 +1,4 @@
.\" $Id: ed.1,v 1.6 1994/09/24 02:55:24 davidg Exp $
.\" $Id: ed.1,v 1.7 1996/08/29 18:05:50 wosch Exp $
.TH ED 1 "21 May 1993"
.SH NAME
.\" ed, red \- text editor
@ -167,7 +167,7 @@ and is legal wherever it makes sense.
An address range is two addresses separated either by a comma or
semi-colon. The value of the first address in a range cannot exceed the
value of the the second. If only one address is given in a range, then
value of the second. If only one address is given in a range, then
the second address is set to the given address. If an
.IR n- tuple
of addresses is given where

View File

@ -1,3 +1,5 @@
.\" $Id$
.\"
.de Id
.ds Rv \\$3
.ds Dt \\$4
@ -1274,7 +1276,7 @@ Each
file is searched for the revision or tag.
.TP 1i
\fB\ \ \ \ \ \ \-t\fP \fItag\fP
Show records since tag \fItag\fP was last added to the the history file.
Show records since tag \fItag\fP was last added to the history file.
This differs from the \fB-r\fP flag above in that it reads
only the history file, not the
.SM RCS

View File

@ -17,6 +17,8 @@
.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
.\"
.\" $Id$
.\"
.TH PCAP 3 "18 July 1996"
.SH NAME
pcap \- Packet Capture library
@ -152,7 +154,7 @@ If there is an error,
.B NULL
is returned and
.I errbuf
is filled in with with an appropriate error message.
is filled in with an appropriate error message.
.PP
.B pcap_lookupnet()
is used to determine the network number and mask
@ -167,7 +169,7 @@ are
pointers.
A return of -1 indicates an error in which case
.I errbuf
is filled in with with an appropriate error message.
is filled in with an appropriate error message.
.PP
.B pcap_dispatch()
is used to collect and process packets.

View File

@ -5,6 +5,7 @@
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
'\"
'\" SCCS: @(#) FindExec.3 1.3 96/03/25 20:03:17
'\" $Id$
'\"
.so man.macros
.TH Tcl_FindExecutable 3 7.5 Tcl "Tcl Library Procedures"
@ -30,7 +31,7 @@ This procedure computes the full path name of the executable file
from which the application was invoked and saves it for Tcl's
internal use.
The executable's path name is needed for several purposes in
Tcl. For example, is is needed on some platforms in the
Tcl. For example, it is needed on some platforms in the
implementation of the \fBload\fR command.
It is also returned by the \fBinfo nameofexecutable\fR command.
.PP

View File

@ -6,6 +6,7 @@
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
'\"
'\" SCCS: @(#) break.n 1.6 96/03/25 20:10:27
'\" $Id$
'\"
.so man.macros
.TH break n "" Tcl "Tcl Built-In Commands"
@ -24,7 +25,7 @@ such as \fBfor\fR or \fBforeach\fR or \fBwhile\fR.
It returns a TCL_BREAK code, which causes a break exception
to occur.
The exception causes the current script to be aborted
out to the the innermost containing loop command, which then
out to the innermost containing loop command, which then
aborts its execution and returns normally.
Break exceptions are also handled in a few other situations, such
as the \fBcatch\fR command, Tk event bindings, and the outermost

View File

@ -6,6 +6,7 @@
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
'\"
'\" SCCS: @(#) continue.n 1.6 96/03/25 20:12:09
'\" $Id$
'\"
.so man.macros
.TH continue n "" Tcl "Tcl Built-In Commands"
@ -24,7 +25,7 @@ such as \fBfor\fR or \fBforeach\fR or \fBwhile\fR.
It returns a TCL_CONTINUE code, which causes a continue exception
to occur.
The exception causes the current script to be aborted
out to the the innermost containing loop command, which then
out to the innermost containing loop command, which then
continues with the next iteration of the loop.
Catch exceptions are also handled in a few other situations, such
as the \fBcatch\fR command and the outermost scripts of procedure

View File

@ -6,6 +6,7 @@
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
'\"
'\" SCCS: @(#) expr.n 1.17 96/03/14 10:54:40
'\" $Id$
'\"
.so man.macros
.TH expr n 7.4 Tcl "Tcl Built-In Commands"
@ -259,7 +260,7 @@ example,
\fBexpr 20.0/5.0\fR
.CE
returns ``4.0'', not ``4''. The global variable \fBtcl_precision\fR
determines the the number of significant digits that are retained
determines the number of significant digits that are retained
when floating values are converted to strings (except that trailing
zeroes are omitted). If \fBtcl_precision\fR
is unset then 6 digits of precision are used.

View File

@ -6,6 +6,7 @@
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
'\"
'\" SCCS: @(#) unknown.n 1.7 96/03/25 20:26:05
'\" $Id$
'\"
.so man.macros
.TH unknown n "" Tcl "Tcl Built-In Commands"
@ -52,7 +53,7 @@ If so, it invokes the Tcl \fBexec\fR command
with \fIcmd\fR and all the \fIargs\fR as arguments.
If \fIcmd\fR can't be auto-executed, \fBunknown\fR checks to
see if the command was invoked at top-level and outside of any
script. If so, then \fBunknown\fR takes takes two additional steps.
script. If so, then \fBunknown\fR takes two additional steps.
First, it sees if \fIcmd\fR has one of the following three forms:
\fB!!\fR, \fB!\fIevent\fR, or \fB^\fIold\fB^\fInew\fR?\fB^\fR?.
If so, then \fBunknown\fR carries out history substitution

View File

@ -1,3 +1,5 @@
.\" $Id$
.\"
.de sh
.br
.ne 5
@ -1164,7 +1166,7 @@ and
a player may posses, based upon
.B level.
.I Quicksilver
is always limited to to a maximum of 99.
is always limited to a maximum of 99.
.PP
.I Books
bought at a

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)sail.6 8.2 (Berkeley) 12/30/93
.\" $Id$
.\"
.TH SAIL 6 "December 30, 1993"
.UC 4
@ -254,7 +255,7 @@ any fleet were its "Ships of the Line", or "Line of Battle Ships". They
were so named because these ships fought together in great lines. They were
close enough for mutual support, yet every ship could fire both its broadsides.
We get the modern words "ocean liner," or "liner," and "battleship" from
"ship of the line." The most common size was the the 74 gun two decked
"ship of the line." The most common size was the 74 gun two decked
ship of the line. The two gun decks usually mounted 18 and 24 pounder guns.
.PP
The pride of the fleet were the first rates. These were huge three decked

View File

@ -25,6 +25,7 @@
.\" Western Washington University
.\" Bellingham, WA 98226-9062
.\"
.\" $Id$
.\"
.TH bc 1 .\" "Command Manual" v1.02 "Feb 3, 1992"
.SH NAME
@ -310,7 +311,7 @@ precision, some numbers may not be printable on a single output line.
These long numbers will be split across lines using the "\e" as the
last character on a line. The maximum number of characters printed
per line is 70. Due to the interactive nature of \fBbc\fR printing
a number cause the side effect of assigning the printed value the the
a number cause the side effect of assigning the printed value the
special variable \fBlast\fR. This allows the user to recover the
last value printed without having to retype the expression that
printed the number. Assigning to \fBlast\fR is legal and will
@ -327,7 +328,7 @@ The print statement (an extension) provides another method of output.
The "list" is a list of strings and expressions separated by commas.
Each string or expression is printed in the order of the list. No
terminating newline is printed. Expressions are evaluated and their
value is printed and assigned the the variable \fBlast\fR. Strings
value is printed and assigned the variable \fBlast\fR. Strings
in the print statement are printed to the output and may contain
special characters. Special characters start with the backslash
character (\e). The special characters recognized by \fBbc\fR are

View File

@ -1,7 +1,13 @@
.rn '' }`
''' $RCSfile: perl.1,v $$Revision: 1.1.1.1 $$Date: 1994/09/10 06:27:36 $
''' $RCSfile: perl.1,v $$Revision: 1.2 $$Date: 1994/10/27 23:16:52 $
'''
''' $Log: perl.1,v $
''' Revision 1.2 1994/10/27 23:16:52 wollman
''' Convince Perl to that is is part of the system, as /usr/bin/perl (binary)
''' and /usr/share/perl (library). The latter was chosen as analogous to other
''' directories already present in /usr/share, like /usr/share/groff_font and
''' (particularly) /usr/share/mk.
'''
.\" Revision 1.1.1.1 1994/09/10 06:27:36 gclarkii
.\" Initial import of Perl 4.046 bmaked
.\"
@ -505,7 +511,7 @@ If a directory name is specified, Perl will switch to that directory
before running the script.
The
.B \-x
switch only controls the the disposal of leading garbage.
switch only controls the disposal of leading garbage.
The script must be terminated with _\|_END_\|_ if there is trailing garbage
to be ignored (the script can process any or all of the trailing garbage
via the DATA filehandle if desired).

View File

@ -1,3 +1,5 @@
.\" $Id$
.\"
.TH info 1 "7th December 1990"
.SH NAME
info \- GNU's hypertext system
@ -148,7 +150,7 @@ Pick a menu item specified by name. Picking a menu item causes another
node to be selected. You do not need to type a complete nodename; if
you type a few letters and then a space or tab
.B info
will will try to fill in the rest of the nodename. If you ask for further
will try to fill in the rest of the nodename. If you ask for further
completion without typing any more characters you'll be given a list
of possibilities; you can also get the list with
.B ?.

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)mpool.3 8.1 (Berkeley) 6/4/93
.\" $Id$
.\"
.TH MPOOL 3 "June 4, 1993"
.UC 7
@ -115,7 +116,7 @@ If the
.I pgout
function is specified, it is called each time a buffer is written into the
backing file.
Both functions are are called with the
Both functions are called with the
.I pgcookie
pointer, the page number and a pointer to the page to being read or written.
.PP

View File

@ -23,7 +23,7 @@
.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ftok.3,v 1.3 1996/02/12 07:06:23 mpp Exp $
.\" $Id: ftok.3,v 1.4 1996/06/03 10:40:39 joerg Exp $
.Dd June 24, 1994
.Os
.Dt ftok 3
@ -82,4 +82,4 @@ specified
.Fa path
in combination with the lower 8 bits of the given
.Fa id .
Thus is is quite possible for the routine to return duplicate keys.
Thus it is quite possible for the routine to return duplicate keys.

View File

@ -34,6 +34,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)memcmp.3 8.1 (Berkeley) 6/4/93
.\" $Id$
.\"
.Dd June 4, 1993
.Dt MEMCMP 3
@ -60,7 +61,7 @@ bytes long.
The
.Fn memcmp
function
returns zero if the the two strings are identical,
returns zero if the two strings are identical,
otherwise returns the difference between the first two differing bytes
(treated as unsigned char values, so that
.Sq Li \e200

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)madvise.2 8.1 (Berkeley) 6/9/93
.\" $Id$
.\"
.Dd Jul 19, 1996
.Dt MADVISE 2
@ -81,7 +82,7 @@ of pages in the specified range. Additionally future references to
this address range will incur a page fault.
.sp
MADV_FREE gives the VM system the freedom to free pages,
and and tells the system that information in the specified page range
and tells the system that information in the specified page range
is no longer important. This is an efficient way of allowing malloc(3) to
free pages anywhere in the address space, while keeping the address space
valid. The next time that the page is referenced, the page might be demand

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)mkdir.2 8.2 (Berkeley) 12/11/93
.\" $Id$
.\"
.Dd December 11, 1993
.Dt MKDIR 2
@ -46,7 +47,7 @@ The directory
.Fa path
is created with the access permissions specified by
.Fa mode
and restricted by the the
and restricted by the
.Xr umask 2
of the calling process.
.Pp

View File

@ -1,4 +1,6 @@
.\" @(#)xdr.3n 2.2 88/08/03 4.0 RPCSRC; from 1.16 88/03/14 SMI
.\" $Id$
.\"
.TH XDR 3 "16 February 1988"
.SH NAME
xdr \- library routines for external data representation
@ -753,7 +755,7 @@ parameter
.I arrp
is the address of the pointer to the array, while
.I size
is is the element count of the array. The parameter
is the element count of the array. The parameter
.I elsize
is the
.I sizeof

View File

@ -23,7 +23,7 @@
.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ftok.3,v 1.3 1996/02/12 07:06:23 mpp Exp $
.\" $Id: ftok.3,v 1.4 1996/06/03 10:40:39 joerg Exp $
.Dd June 24, 1994
.Os
.Dt ftok 3
@ -82,4 +82,4 @@ specified
.Fa path
in combination with the lower 8 bits of the given
.Fa id .
Thus is is quite possible for the routine to return duplicate keys.
Thus it is quite possible for the routine to return duplicate keys.

View File

@ -22,6 +22,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id$
.\"
.Dd June 17, 1996
.Dt ftpio 3
@ -90,7 +91,7 @@ subsequent FTP operations. On failure, NULL is returned and
will return the error code returned by the foreign server.
.Pp
.Fn ftpChdir
attempts to issue a server CD command to the the directory named in
attempts to issue a server CD command to the directory named in
.Fa dir.
On success, zero is returned. On failure, the error code from the server.
.Pp

View File

@ -1,3 +1,5 @@
.\" $Id$
.\"
.TH curs_addch 3 ""
.SH NAME
\fBaddch\fR, \fBwaddch\fR, \fBmvaddch\fR, \fBmvwaddch\fR,
@ -52,7 +54,7 @@ these routines instead of their equivalents.
The following variables may be used to add line drawing characters to the
screen with routines of the \fBaddch\fR family. The default character listed
below is used if the \fBacsc\fR capability doesn't define a terminal-specific
replacement for it. The names are taken from the the VT100 nomenclature.
replacement for it. The names are taken from the VT100 nomenclature.
.TS
l l l

View File

@ -1,3 +1,5 @@
.\" $Id$
.\"
.TH curs_insstr 3 ""
.SH NAME
\fBinsstr\fR, \fBinsnstr\fR, \fBwinsstr\fR, \fBwinsnstr\fR,
@ -38,7 +40,7 @@ to be at every eighth column. If a character in \fIstr\fR is another
control character, it is drawn in the \fB^\fR\fIX\fR notation.
Calling \fBwinch\fR after adding a control character (and moving to
it, if necessary) does not return the control character, but instead
returns a character in the the ^-representation of the control character.
returns a character in the ^-representation of the control character.
.SH RETURN VALUE
All routines return the integer \fBERR\fR upon failure and an integer value
other than \fBERR\fR upon successful completion.

View File

@ -30,7 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)telnetd.8 8.3 (Berkeley) 3/1/94
.\" $Id$
.\" $Id: telnetd.8,v 1.3 1996/09/22 21:55:44 wosch Exp $
.\"
.Dd March 1, 1994
.Dt TELNETD 8
@ -224,7 +224,7 @@ will operate in character at a time mode.
It will still support kludge linemode, but will only
go into kludge linemode if the remote client requests
it.
(This is done by by the client sending
(This is done by the client sending
.Dv DONT SUPPRESS-GO-AHEAD
and
.Dv DONT ECHO . )

View File

@ -35,7 +35,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)mount_null.8 8.4 (Berkeley) 4/19/94
.\"
.\" $Id$
.\"
.Dd April 19, 1994
.Dt MOUNT_NULL 8
@ -195,7 +195,7 @@ by mapping an vnode arguments to the lower layer.
The first approach is to call the aliasing layer's bypass routine.
This method is most suitable when you wish to invoke the operation
currently being handled on the lower layer. It has the advantage
the the bypass routine already must do argument mapping.
the bypass routine already must do argument mapping.
An example of this is
.Em null_getattrs
in the null layer.

View File

@ -35,7 +35,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)mount_null.8 8.4 (Berkeley) 4/19/94
.\"
.\" $Id$
.\"
.Dd April 19, 1994
.Dt MOUNT_NULL 8
@ -195,7 +195,7 @@ by mapping an vnode arguments to the lower layer.
The first approach is to call the aliasing layer's bypass routine.
This method is most suitable when you wish to invoke the operation
currently being handled on the lower layer. It has the advantage
the the bypass routine already must do argument mapping.
the bypass routine already must do argument mapping.
An example of this is
.Em null_getattrs
in the null layer.

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)ping.8 8.2 (Berkeley) 12/11/93
.\" $Id$
.\"
.Dd December 11, 1993
.Dt PING 8
@ -326,7 +327,7 @@ The maximum IP header length is too small for options like
.Tn RECORD_ROUTE
to
be completely useful.
There's not much that that can be done about this, however.
There's not much that can be done about this, however.
.Pp
Flood pinging is not recommended in general, and flood pinging the
broadcast address should only be done under very controlled conditions.

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)cap_mkdb.1 8.1 (Berkeley) 6/6/93
.\" $Id$
.\"
.Dd "June 6, 1993"
.Dt CAP_MKDB 1
@ -63,7 +64,7 @@ than they can the original text file(s).
The ``tc'' capabilities of the records are expanded before the
record is stored into the database.
.Pp
The options as as follows:
The options as follows:
.Bl -tag -width XXXXXX -indent
.It Fl f Ar outfile
Specify a different database basename.
@ -83,7 +84,7 @@ that couldn't be expanded.
.Pp
The second type is a key which consists of one of the names from the
first capability of the record with a data field consisting a special
byte followed by the the first capability of the record.
byte followed by the first capability of the record.
The special byte is a 2.
.Pp
In normal operation names are looked up in the database, resulting

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)hexdump.1 8.2 (Berkeley) 4/18/94
.\" $Id$
.\"
.Dd April 18, 1994
.Dt HEXDUMP 1
@ -213,7 +214,7 @@ described in the C standard are supported:
.Ed
.El
.Pp
Hexdump also supports the the following additional conversion strings:
Hexdump also supports the following additional conversion strings:
.Bl -tag -width Fl
.It Cm \&_a Ns Op Cm dox
Display the input offset, cumulative across input files, of the

View File

@ -27,7 +27,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: ipcs.1,v 1.1 1994/09/13 16:59:28 dfr Exp $
.\" $Id: ipcs.1,v 1.2 1994/11/19 18:19:27 nate Exp $
.\"
.Dd June 18, 1994
.Dt "IPCS" 1
@ -66,7 +66,7 @@ and shared memory segments. The
.Dq maximum allowed size
is the maximum number of bytes in a message on a message queue,
the size of a shared memory segment,
or the number number of semaphores in a set of semaphores.
or the number of semaphores in a set of semaphores.
.It Fl c
Show the creator's name and group for active semaphores, message queues,
and shared memory segments.

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)make.1 8.4 (Berkeley) 3/19/94
.\" $Id$
.\"
.Dd March 19, 1994
.Dt MAKE 1
@ -586,7 +587,7 @@ Test the value of a variable.
.Oo \&! Oc Ns Ar target
.Op Ar operator target ...
.Xc
Test the the target being built.
Test the target being built.
.It Xo
.Ic .ifnmake
.Oo \&! Oc Ar target

View File

@ -33,7 +33,7 @@
.\" SUCH DAMAGE.
.\"
.\" from: @(#)quota.1 8.1 (Berkeley) 6/6/93
.\" $Id: quota.1,v 1.4 1994/06/28 07:47:24 deraadt Exp $
.\" $Id: quota.1,v 1.2 1996/01/05 08:37:28 graichen Exp $
.\"
.Dd June 6, 1993
.Dt QUOTA 1
@ -90,7 +90,7 @@ Only the super-user may use the
flag and the optional
.Ar user
argument to view the limits of other users.
Non-super-users can use the the
Non-super-users can use the
.Fl g
flag and optional
.Ar group

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)ranlib.1 8.1 (Berkeley) 6/6/93
.\" $Id$
.\"
.Dd June 6, 1993
.Dt RANLIB 1
@ -46,7 +47,7 @@
creates a table of external references for archive libraries,
normally used by the loader,
.Xr ld 1 .
This table is is named ``__.SYMDEF'' and is prepended to the archive.
This table is named ``__.SYMDEF'' and is prepended to the archive.
Files in the archive which are not executable and symbols which are
uninteresting to the loader are ignored.
.Pp

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)ranlib.1 8.1 (Berkeley) 6/6/93
.\" $Id$
.\"
.Dd June 6, 1993
.Dt RANLIB 1
@ -46,7 +47,7 @@
creates a table of external references for archive libraries,
normally used by the loader,
.Xr ld 1 .
This table is is named ``__.SYMDEF'' and is prepended to the archive.
This table is named ``__.SYMDEF'' and is prepended to the archive.
Files in the archive which are not executable and symbols which are
uninteresting to the loader are ignored.
.Pp

View File

@ -1,3 +1,4 @@
'\" $Id$
'\" t
.\" Uncomment the next line to get a man page accurate for MS-DOS
.\"nr Os 1
@ -247,7 +248,7 @@ sequence of entries in one of the following four forms:
.BI PUBLIC\ pubid\ sysid
This specifies that
.I sysid
should be used as the system identifier if the the public
should be used as the system identifier if the public
identifier is
.IR pubid .
.I Sysid

View File

@ -1,4 +1,6 @@
.\" @(#) mytinfo tconv.1 3.2 92/02/01 public domain, By Ross Ridge
.\" $Id$
.\"
.TH TCONV 1 "92/02/01" "mytinfo"
.SH NAME
tconv \- convert between termcap, terminfo source and terminfo binary
@ -87,7 +89,7 @@ are given the
option will be assumed.
If the
.B \-B
option is used, the compiled output will be put in the the
option is used, the compiled output will be put in the
terminfo database, otherwise standard output is used.
.PP
You cannot translate from terminfo binary to terminfo binary.

View File

@ -30,6 +30,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)telnet.1 8.5 (Berkeley) 3/1/94
.\" $Id$
.\"
.Dd March 1, 1994
.Dt TELNET 1
@ -999,7 +1000,7 @@ commands.
The
.Ic slc
command (Set Local Characters) is used to set
or change the state of the the special
or change the state of the special
characters when the
.Dv TELNET LINEMODE
option has

View File

@ -1,3 +1,5 @@
.\" $Id$
.\"
.Dd July 3, 1995
.Dt CDCONTROL 1
.Os FreeBSD
@ -114,7 +116,7 @@ Play the left subtrack on both left and right channels.
Play the right subtrack on both left and right channels.
.It Cm info
Print the the table of contents.
Print the table of contents.
.It Cm status
Print the information about the disc:

View File

@ -27,7 +27,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" $Id: sa.8,v 1.2 1994/09/26 21:41:06 davidg Exp $
.\" $Id: sa.8,v 1.3 1996/04/07 00:05:57 mpp Exp $
.\"
.Dd February 25, 1994
.Dt SA 8
@ -48,7 +48,7 @@ and generally maintains system
accounting files.
.Pp
.Nm Sa
is able to condense the the information in
is able to condense the information in
.Pa /var/account/acct
into the summary files
.Pa /var/account/savacct

View File

@ -1,4 +1,4 @@
''' $Header
''' $Id$
'''
.de Sh
.br
@ -70,7 +70,7 @@ which sets the slew rate and resolution used by the
system call, and
.IR dosynctodr ,
which indicates to the kernels on some machines whether they should internally
adjust the system clock to keep it in line with with time\-of\-day clock
adjust the system clock to keep it in line with time\-of\-day clock
or not.
.PP
By default, with no arguments,
@ -92,7 +92,7 @@ with
Various flags may be specified to change the variables of interest in
the running kernel. The
.B -a
flag allows one to set the the variable
flag allows one to set the variable
.I tickadj
to the value specified as an argument. The
.B -A

View File

@ -29,7 +29,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: ypbind.8,v 1.3 1995/07/20 22:33:02 wpaul Exp $
.\" $Id: ypbind.8,v 1.4 1996/02/11 22:37:51 mpp Exp $
.\"
.Dd April 9, 1995
.Dt YPBIND 8
@ -110,7 +110,7 @@ The
flag allows the system administrator to lock ypbind to a particular
domain and group of NIS servers. Up to ten servers can be specified.
There must not be any spaces between the commas in the domain/server
specification. This option is used to insure that that the system binds
specification. This option is used to insure that the system binds
only to one domain and only to one of the specified servers, which
is useful for systems that are both NIS servers and NIS
clients: it provides a way to restrict what machines the system can