summaryrefslogtreecommitdiff
path: root/docs/ref/templates
diff options
context:
space:
mode:
authorDavid Smith <smithdc@gmail.com>2021-07-23 07:48:16 +0100
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2021-07-29 06:24:12 +0200
commit1024b5e74a7166313ad4e4975a15e90dccd3ec5f (patch)
tree05d75177f183de5e3c58dbf25a3f71ff4a5c820a /docs/ref/templates
parentacde91745656a852a15db7611c08cabf93bb735b (diff)
downloaddjango-1024b5e74a7166313ad4e4975a15e90dccd3ec5f.tar.gz
Fixed 32956 -- Lowercased spelling of "web" and "web framework" where appropriate.
Diffstat (limited to 'docs/ref/templates')
-rw-r--r--docs/ref/templates/api.txt2
-rw-r--r--docs/ref/templates/language.txt4
2 files changed, 3 insertions, 3 deletions
diff --git a/docs/ref/templates/api.txt b/docs/ref/templates/api.txt
index 01748715b7..7e9812fffb 100644
--- a/docs/ref/templates/api.txt
+++ b/docs/ref/templates/api.txt
@@ -805,7 +805,7 @@ directories::
]
Your templates can go anywhere you want, as long as the directories and
-templates are readable by the Web server. They can have any extension you want,
+templates are readable by the web server. They can have any extension you want,
such as ``.html`` or ``.txt``, or they can have no extension at all.
Note that these paths should use Unix-style forward slashes, even on Windows.
diff --git a/docs/ref/templates/language.txt b/docs/ref/templates/language.txt
index 04b363c0cf..ffddd7435a 100644
--- a/docs/ref/templates/language.txt
+++ b/docs/ref/templates/language.txt
@@ -471,10 +471,10 @@ That would result in a rendered template like this::
Hello, <b>username
-...which, in turn, would result in the remainder of the Web page being bolded!
+...which, in turn, would result in the remainder of the web page being bolded!
Clearly, user-submitted data shouldn't be trusted blindly and inserted directly
-into your Web pages, because a malicious user could use this kind of hole to
+into your web pages, because a malicious user could use this kind of hole to
do potentially bad things. This type of security exploit is called a
`Cross Site Scripting`_ (XSS) attack.