diff --git a/doc/api/crypto.md b/doc/api/crypto.md
index 84e5520186dbb6..8f4fd9a6d56ed7 100644
--- a/doc/api/crypto.md
+++ b/doc/api/crypto.md
@@ -6645,7 +6645,7 @@ See the [list of SSL OP Flags][] for details.
SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS |
- Instructs OpenSSL to disable a SSL 3.0/TLS 1.0 vulnerability
+ | Instructs OpenSSL to disable an SSL 3.0/TLS 1.0 vulnerability
workaround added in OpenSSL 0.9.6d. |
diff --git a/doc/api/http.md b/doc/api/http.md
index 8ac1ed166103b0..3b36fef4eca0bd 100644
--- a/doc/api/http.md
+++ b/doc/api/http.md
@@ -1517,7 +1517,7 @@ changes:
- version: v12.0.0
pr-url: https://github.com/nodejs/node/pull/25605
description: The default behavior will return a 431 Request Header
- Fields Too Large if a HPE_HEADER_OVERFLOW error occurs.
+ Fields Too Large if an HPE_HEADER_OVERFLOW error occurs.
- version: v9.4.0
pr-url: https://github.com/nodejs/node/pull/17672
description: The `rawPacket` is the current buffer that just parsed. Adding
@@ -1543,8 +1543,8 @@ This event is guaranteed to be passed an instance of the {net.Socket} class,
a subclass of {stream.Duplex}, unless the user specifies a socket
type other than {net.Socket}.
-Default behavior is to try close the socket with a HTTP '400 Bad Request',
-or a HTTP '431 Request Header Fields Too Large' in the case of a
+Default behavior is to try close the socket with an HTTP '400 Bad Request',
+or an HTTP '431 Request Header Fields Too Large' in the case of an
[`HPE_HEADER_OVERFLOW`][] error. If the socket is not writable or headers
of the current attached [`http.ServerResponse`][] has been sent, it is
immediately destroyed.
@@ -2703,7 +2703,7 @@ will result in a [`TypeError`][] being thrown.
added: v10.0.0
-->
-Sends a HTTP/1.1 102 Processing message to the client, indicating that
+Sends an HTTP/1.1 102 Processing message to the client, indicating that
the request body should be sent.
## Class: `http.IncomingMessage`
@@ -3690,7 +3690,7 @@ changes:
`readableHighWaterMark` and `writableHighWaterMark`. This affects
`highWaterMark` property of both `IncomingMessage` and `ServerResponse`.
**Default:** See [`stream.getDefaultHighWaterMark()`][].
- * `insecureHTTPParser` {boolean} If set to `true`, it will use a HTTP parser
+ * `insecureHTTPParser` {boolean} If set to `true`, it will use an HTTP parser
with leniency flags enabled. Using the insecure parser should be avoided.
See [`--insecure-http-parser`][] for more information.
**Default:** `false`.
@@ -4001,7 +4001,7 @@ changes:
request to. **Default:** `'localhost'`.
* `hostname` {string} Alias for `host`. To support [`url.parse()`][],
`hostname` will be used if both `host` and `hostname` are specified.
- * `insecureHTTPParser` {boolean} If set to `true`, it will use a HTTP parser
+ * `insecureHTTPParser` {boolean} If set to `true`, it will use an HTTP parser
with leniency flags enabled. Using the insecure parser should be avoided.
See [`--insecure-http-parser`][] for more information.
**Default:** `false`
diff --git a/doc/api/http2.md b/doc/api/http2.md
index 759430a0f34cd8..c4854f270f5b8a 100644
--- a/doc/api/http2.md
+++ b/doc/api/http2.md
@@ -3966,7 +3966,7 @@ const server = createSecureServer(
).listen(8000);
function onRequest(req, res) {
- // Detects if it is a HTTPS request or HTTP/2
+ // Detects if it is an HTTPS request or HTTP/2
const { socket: { alpnProtocol } } = req.httpVersion === '2.0' ?
req.stream.session : req;
res.writeHead(200, { 'content-type': 'application/json' });
@@ -3990,7 +3990,7 @@ const server = createSecureServer(
).listen(4443);
function onRequest(req, res) {
- // Detects if it is a HTTPS request or HTTP/2
+ // Detects if it is an HTTPS request or HTTP/2
const { socket: { alpnProtocol } } = req.httpVersion === '2.0' ?
req.stream.session : req;
res.writeHead(200, { 'content-type': 'application/json' });
diff --git a/doc/api/module.md b/doc/api/module.md
index ebede62eeca3a4..b680e0f9932c6a 100644
--- a/doc/api/module.md
+++ b/doc/api/module.md
@@ -364,7 +364,7 @@ changes:
The module compile cache can be enabled either using the [`module.enableCompileCache()`][]
method or the [`NODE_COMPILE_CACHE=dir`][] environment variable. After it is enabled,
-whenever Node.js compiles a CommonJS, a ECMAScript Module, or a TypeScript module, it will
+whenever Node.js compiles a CommonJS, an ECMAScript Module, or a TypeScript module, it will
use on-disk [V8 code cache][] persisted in the specified directory to speed up the compilation.
This may slow down the first load of a module graph, but subsequent loads of the same module
graph may get a significant speedup if the contents of the modules do not change.
diff --git a/doc/api/tls.md b/doc/api/tls.md
index dc4719d391d003..5d11e2c53eada0 100644
--- a/doc/api/tls.md
+++ b/doc/api/tls.md
@@ -1212,7 +1212,7 @@ added: v9.9.0
-->
* Returns: {Buffer|undefined} The latest `Finished` message that has been
- sent to the socket as part of a SSL/TLS handshake, or `undefined` if
+ sent to the socket as part of an SSL/TLS handshake, or `undefined` if
no `Finished` message has been sent yet.
As the `Finished` messages are message digests of the complete handshake
@@ -1355,7 +1355,7 @@ added: v9.9.0
-->
* Returns: {Buffer|undefined} The latest `Finished` message that is expected
- or has actually been received from the socket as part of a SSL/TLS handshake,
+ or has actually been received from the socket as part of an SSL/TLS handshake,
or `undefined` if there is no `Finished` message so far.
As the `Finished` messages are message digests of the complete handshake