Jump to content

User:Minhprime/Books/M1

From Wikipedia, the free encyclopedia


CE PE Exam Study Guide II

[edit]

Study guide for the NCEES Computer Engineering PE Exam

[edit]
Part 1 - Basics
Character Encoding
Character (computing)
Universal Character Set
IEEE 1394
ASCII
Math
Bitwise operation
Signed number representations
IEEE floating point
Operators in C and C++
De Morgan's laws
Booth's multiplication algorithm
Binary multiplier
Wallace tree
Dadda multiplier
Multiply–accumulate operation
Big O notation
Euler's identity
Basic Electronics
Series and parallel circuits
RLC circuit
Transistor
Operational amplifier applications
Signal Processing
Signal processing
Digital filter
Fast Fourier transform
Cooley–Tukey FFT algorithm
Modified discrete cosine transform
Digital signal processing
Analog-to-digital converter
Error Detection/Correction
Parity bit
Error detection and correction
Cyclic redundancy check
Hamming code
Hamming(7,4)
Convolutional code
Forward error correction
Noisy-channel coding theorem
Modulation
Signal-to-noise ratio
Linear code
Noise (electronics)
Part 2 - Hardware
Hardware
Logic family
Multi-level cell
Flip-flop (electronics)
Race condition
Binary decision diagram
Circuit minimization for Boolean functions
Karnaugh map
Quine–McCluskey algorithm
Integrated circuit design
Programmable Logic
Standard cell
Programmable logic device
Field-programmable gate array
Complex programmable logic device
Application-specific integrated circuit
Logic optimization
Register-transfer level
Floorplan (microelectronics)
Hardware description language
VHDL
Verilog
Electronic design automation
Espresso heuristic logic minimizer
Routing (electronic design automation)
Static timing analysis
Placement (EDA)
Power optimization (EDA)
Timing closure
Design flow (EDA)
Design closure
Rent's rule
Assembly/Test
Design rule checking
SystemVerilog
In-circuit test
Joint Test Action Group
Boundary scan
Boundary scan description language
Test bench
Ball grid array
Head in pillow (metallurgy)
Pad cratering
Land grid array
Processors
Computer architecture
Harvard architecture
Processor design
Central processing unit
Microcode
Arithmetic logic unit
CPU cache
Instruction set
Orthogonal instruction set
Classic RISC pipeline
Reduced instruction set computing
Instruction-level parallelism
Instruction pipeline
Hazard (computer architecture)
Bubble (computing)
Superscalar
Parallel computing
Dynamic priority scheduling
Amdahl's law
Benchmark (computing)
Moore's law
Computer performance
Supercomputer
SIMD
Multi-core processor
Explicitly parallel instruction computing
Simultaneous multithreading
Redundancy & Reliability
Dependability
Active redundancy
Dual modular redundancy
Triple modular redundancy
High-availability Seamless Redundancy
N-version programming
RAID
Fault tolerance
Fault-tolerant computer system
Watchdog timer
Redundant array of independent memory
Memory
Computer data storage
Memory controller
Memory management unit
Static random-access memory
Dynamic random-access memory
Synchronous dynamic random-access memory
DDR2 SDRAM
Flash memory
Memory scrubbing
Data striping
Hard disk drive performance characteristics
Disk sector
Part 3 - OS, Software, Testing, AI
Operating Systems
Operating system
Multiprocessing
Concurrent computing
Computer cluster
Distributed computing
Trusted computing base
Embedded system
In-circuit emulator
Real-time operating system
Comparison of real-time operating systems
Rate-monotonic scheduling
Earliest deadline first scheduling
Least slack time scheduling
Deadline-monotonic scheduling
Round-robin scheduling
O(1) scheduler
Thread (computing)
Concurrency control
Synchronization (computer science)
Mutual exclusion
Device driver
Software Development
Software development process
Software requirements specification
Spiral model
Agile software development
Behavior-driven development
Cowboy coding
Lean software development
Extreme programming
Structured systems analysis and design method
List of software development philosophies
Programming language generations
Comparison of programming languages
Printf format string
Programming paradigm
Object-oriented design
Software documentation
Software design document
Object-oriented programming
Concurrent Versions System
Software maintenance
Revision control
Software configuration management
Software release life cycle
MIL-STD-498
Software assurance
Systems development life cycle
Software quality
Software quality management
Relational database
ACID
List of data structures
Semipredicate problem
Application Interface Specification
Homoiconicity
Domain-specific modeling
Unified Modeling Language
Test/Integration
Software testing
Test-driven development
Acceptance test-driven development
Integration testing
Software walkthrough
Code review
Software inspection
Software verification
Functional testing
Software testing
White-box testing
Black-box testing
Gray box testing
Verification and validation (software)
Correctness (computer science)
AI & Robotics
Speech processing
Image processing
Computer vision
Robotics
Speech recognition
Part 4 - Information Theory, Encryption, Networking, and Security
Information Theory
Information theory
Channel capacity
Shannon–Hartley theorem
Nyquist–Shannon sampling theorem
Shannon's source coding theorem
Zero-order hold
Data compression
Modulation order
Phase-shift keying
Encryption
Hash function
List of hash functions
String searching algorithm
Avalanche effect
Rabin–Karp algorithm
Burst error-correcting code
Cryptography
Cryptographic hash function
Public-key cryptography
Viterbi algorithm
Networking
Computer network
List of network buses
Wide area network
Local area network
Network science
Non-return-to-zero
Manchester code
Ethernet
Internet
OSI model
Transmission Control Protocol
Point-to-Point Protocol
Exposed node problem
Circuit switching
Fiber-optic communication
Capacity management
Bandwidth management
Bandwidth (computing)
Throughput
Networking hardware
Wireless network
IEEE 802.11
Complementary code keying
Session Initiation Protocol
Message authentication code
Port Control Protocol
Network monitoring
Simple Network Management Protocol
Measuring network throughput
Reliability (computer networking)
Channel access method
Time division multiple access
Security
Computer security
Separation of protection and security
Information security
Internet security
Hacker (computer security)
DMZ (computing)
Firewall (computing)
Stateful firewall
Intrusion detection system
Denial-of-service attack
IP address spoofing
Part 5 - Misc
Multiple-criteria decision analysis