Skip to content

Commit 7ecff45

Browse files
author
Vladimir Kotal
committed
fix translation
1 parent 85ac598 commit 7ecff45

File tree

5 files changed

+92
-8
lines changed

5 files changed

+92
-8
lines changed

history.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
\item \emsl{Also note that UNIX is roughly 10 years older than DOS.}
6969
\item The Multics system had 9 main goals, as described in the
7070
\emph{Introduction and Overview of the Multics System} article from 1965.
71-
Most interesting goal was probably a request for uniterrupted system run.
71+
Most interesting goal was probably a request for uninterrupted system run.
7272
\item Multics was written in the PL/I (Programming Language \#1), therefore
7373
earlier than UNIX was rewritten to C !
7474
\item Multics gained as a first system the B2 security level in 1980.

intro.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -865,7 +865,7 @@
865865
\begin{itemize}
866866
\item \texttt{-l}/\texttt{-L} are actually options for the linker, ie. the
867867
compiler will pass them on onto the linker.
868-
\item Both the compiler and linker have an extensive list of additonal options
868+
\item Both the compiler and linker have an extensive list of additional options
869869
that influence the generated code and what warnings are printed during the
870870
compilation/linking based on the chosen language and the standard. See manual
871871
pages for \texttt{cc}, \texttt{gcc}, and/or \texttt{ld}.

proc.tex

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11

22
\pagebreak
3-
\pdfbookmark[0]{process manipulation, program execution}{procesy}
3+
\pdfbookmark[0]{process manipulation, program execution}{processes}
44

55
\begin{slide}
66
\sltitle{Contents}
@@ -244,18 +244,18 @@
244244
\item \emsl{The premise of preemptive planning are periodic timer interrupts}
245245
which take away the CPU from the running process and pass on the CPU
246246
to the kernel (scheduler is activated).
247-
\item The other variant is non-preemtive (cooperative) planning, where process
247+
\item The other variant is non-preemptive (cooperative) planning, where process
248248
keeps running, until it gives up the CPU, i.e. until it calls such system call,
249249
that switches the context to different process. The downside of cooperative
250250
planning is that one process can block the CPU and other processes forever.
251251
\item Unix uses only preemptive planning for user processes.
252252
\item Traditional (historical) UNIX \emsl{kernel} uses cooperative planning,
253253
i.e. process running in kernel mode is not switched until it gives up the CPU
254254
by itself.
255-
\emsl{Modern Unix kernels are preemtive} -- mainly because of real-time
255+
\emsl{Modern Unix kernels are preemptive} -- mainly because of real-time
256256
systems; where it is necessary to have the possibility to remove a CPU from
257257
a running process immediately, and not waiting until it returns from a kernel
258-
mode or enters sleep by itself. Note that UNIX was preemtive from its very
258+
mode or enters sleep by itself. Note that UNIX was preemptive from its very
259259
beginning but its kernel was non-preemptive in the beginning.
260260
\item With a preemptive planning processes can be interrupted at any time and
261261
the CPU given to another process. Therefore a process can never be sure

unix_dict.txt

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -356,3 +356,87 @@ MFF
356356
vnode
357357
vnodes
358358
mountpoint
359+
filesystems
360+
symlink
361+
symlinks
362+
hardlink
363+
hardlinks
364+
fopen
365+
fread
366+
AFS
367+
NONBLOCK
368+
mkfifo
369+
umask
370+
WRONLY
371+
RDWR
372+
CREAT
373+
TRUNC
374+
SIGPIPE
375+
ENXIO
376+
BUF
377+
IFMT
378+
IFBLK
379+
IFCHR
380+
IFIFO
381+
IFREG
382+
IFDIR
383+
IFLNK
384+
ISBLK
385+
ISCHR
386+
ISFIFO
387+
ISREG
388+
ISDIR
389+
ISLNK
390+
IRUSR
391+
IWGRP
392+
lstat
393+
buf
394+
lseek
395+
conv
396+
rsync
397+
ftruncate
398+
fildes
399+
dup
400+
dup
401+
DUPFD
402+
cmd
403+
SETFD
404+
CLOEXEC
405+
fnctl
406+
cmd
407+
GETFD
408+
SUID
409+
UID
410+
GID
411+
setpwent
412+
endpwent
413+
getpwent
414+
EUID
415+
RUID
416+
setuid
417+
mkdir
418+
rmdir
419+
opendir
420+
readdir
421+
closedir
422+
setgid
423+
gid
424+
setgroups
425+
ngroups
426+
brk
427+
sbrk
428+
malloc
429+
malloc
430+
allocator
431+
allocators
432+
SIGALRM
433+
SIGHUP
434+
Ctrl
435+
SIGINT
436+
SIGSEGV
437+
SIGUSR
438+
SIGSEGV
439+
SIGCHLD
440+
SIGKILL
441+
sigwait
442+
sig

user-access.tex

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
changequote([[[, ]]])
33

44
\pagebreak
5-
\pdfbookmark[0]{access rights, peripheal devices, file system}{soubory}
5+
\pdfbookmark[0]{access rights, peripheal devices, file system}{user access}
66

77
\begin{slide}
88
\sltitle{Contents}
@@ -44,7 +44,7 @@
4444
\texttt{/etc/master.passwd} database is used.
4545
\item If \texttt{/etc/shadow} does exist, it is structured in a similar way as
4646
\texttt{/etc/passwd}.
47-
\item There are also protocols used for autentization that do not use
47+
\item There are also protocols used for authentication that do not use
4848
\texttt{/etc/passwd} at all, for example NIS (Network Information Service) or
4949
LDAP (Lightweight Directory Access Protocol).
5050
\item The user group in \texttt{/etc/passwd} is called \emph{primary} for the

0 commit comments

Comments
 (0)