it's -> its

This commit is contained in:
Georg Brandl 2006-03-31 10:38:30 +00:00
parent 4671f815be
commit 31427dfed6
6 changed files with 8 additions and 8 deletions

View File

@ -50,8 +50,8 @@ Motivation
Circular references Circular references
- DOMs require a huge amount of circular (to parent & document - DOMs require a huge amount of circular (to parent & document
nodes), but these could be eliminated using a weak nodes) references, but these could be eliminated using a weak
dictionary mapping from each node to it's parent. This dictionary mapping from each node to its parent. This
might be especially useful in the context of something like might be especially useful in the context of something like
xml.dom.pulldom, allowing the .unlink() operation to become xml.dom.pulldom, allowing the .unlink() operation to become
a no-op. a no-op.
@ -291,7 +291,7 @@ Weak References in Java
"Phantom" references are a little different; unlike weak and soft "Phantom" references are a little different; unlike weak and soft
references, the referent is not cleared when the reference is references, the referent is not cleared when the reference is
added to it's queue. When all phantom references for an object added to its queue. When all phantom references for an object
are dequeued, the object is cleared. This can be used to keep an are dequeued, the object is cleared. This can be used to keep an
object alive until some additional cleanup is performed which object alive until some additional cleanup is performed which
needs to happen before the objects .finalize() method is called. needs to happen before the objects .finalize() method is called.

View File

@ -115,7 +115,7 @@ Problems
/ microthreads. / microthreads.
Generally, when a recursive call is transformed into a loop, a bit Generally, when a recursive call is transformed into a loop, a bit
of extra bookkeeping is required. The loop will need to keep it's of extra bookkeeping is required. The loop will need to keep its
own "stack" of arguments and results since the real stack can now own "stack" of arguments and results since the real stack can now
only hold the most recent. The code will be more verbose, because only hold the most recent. The code will be more verbose, because
it's not quite as obvious when we're done. While Stackless is not it's not quite as obvious when we're done. While Stackless is not

View File

@ -324,7 +324,7 @@ Loggers
def setLoggerClass(klass): ... def setLoggerClass(klass): ...
The passed class should be a subclass of Logger, and it's __init__ The passed class should be a subclass of Logger, and its __init__
method should call Logger.__init__. method should call Logger.__init__.

View File

@ -44,7 +44,7 @@ Specification
The object must be unlocked again by releasing the buffer if it's The object must be unlocked again by releasing the buffer if it's
no longer used by calling another function in the locked buffer no longer used by calling another function in the locked buffer
interface. If the object never resizes or reallocates the buffer interface. If the object never resizes or reallocates the buffer
during it's lifetime, this function may be NULL. Failure to call during its lifetime, this function may be NULL. Failure to call
this function (if it is != NULL) is a programming error and may this function (if it is != NULL) is a programming error and may
have unexpected results. have unexpected results.

View File

@ -23,7 +23,7 @@ BDFL Pronouncement
This PEP is rejected. While the majority of Python users deemed this This PEP is rejected. While the majority of Python users deemed this
to be a nice-to-have feature, the community was unable to reach a to be a nice-to-have feature, the community was unable to reach a
concensus on whether nine should be represented as IX, the modern consensus on whether nine should be represented as IX, the modern
form, or VIIII, the classic form. Likewise, no agreement was form, or VIIII, the classic form. Likewise, no agreement was
reached on whether MXM or MCMXC would be considered a well-formed reached on whether MXM or MCMXC would be considered a well-formed
representation of 1990. A vocal minority of users has also requested representation of 1990. A vocal minority of users has also requested

View File

@ -62,7 +62,7 @@ Motivation
allow Python bytecode to execute arbitrary C-level machine allow Python bytecode to execute arbitrary C-level machine
instructions or to modify private, internal data structures in the instructions or to modify private, internal data structures in the
interpreter. If used cleverly this could subvert any form of interpreter. If used cleverly this could subvert any form of
security policy an application may want to apply to it's objects. security policy an application may want to apply to its objects.
Practically, it would be difficult for a malicious user to Practically, it would be difficult for a malicious user to
"inject" invalid bytecode into a PVM for the purposes of "inject" invalid bytecode into a PVM for the purposes of