Explain naming convention libraries, Computer Engineering

Explanation:-

Common used functions are placed in libraries. These are located in the SQABas32 subdirectory of the Robot working directory. A library is separated into three files, a header (.SBH), an implementation file (.SBL) and the compiled version (.SBX). Libraries are not necessarily bound to an AUT or feature.

Syntax for execution file
[ax]+[ShortName]+"sbl"

Syntax for header file
[ax]+[ShortName]+"sbh"

Examples
· axCommonUtilities.sbl
· axDBAccess.sbh
· axGuiMapper.sbl

 

Posted Date: 4/2/2013 6:34:04 AM | Location : United States







Related Discussions:- Explain naming convention libraries, Assignment Help, Ask Question on Explain naming convention libraries, Get Answer, Expert's Help, Explain naming convention libraries Discussions

Write discussion on Explain naming convention libraries
Your posts are moderated
Related Questions
Storage Technology: In the previous section, the, recent innovations relating to the processing aspects of computer technology were discussed briefly. In considering some of t

With respect to security, which one is the better choice? .Net or J2EE? Explain? As per majority programmers .NET is the best one which have single vendor compare to, the

Q. Explain Addressing modes in RISC? Simple addressing modes: Another benefit is the use of simple addressing modes. RISC machines employ simple register addressing having disp

What is Machine Language? To write program for a computer we need to specify, directly or indirectly the sequence of machine instructions.  These instructions  inside  computer

The Concept of Concurrent and Parallel Execution Real world systems are concurrent in nature and computer science is about modeling the real world. Illustrations of real world

What is recursing downwards? And its ways. The design process generally works top-down; you start with the higher level operations and proceed to describe lower level operation

What is Monkey testing? The monkey testing is the process of testing here and there for judging the application trying to observe the accessing dissimilar functionalities is i

A firewall is Software or hardware used to separate a private network from a public network.

What are the simplest way to restrict the users The simplest way to restrict the users to peek inside the internals of the Web site is to use firewalls, where the information c

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg