请输入您要查询的百科知识:

 

词条 Book:CE PE Exam Study Guide II
释义

  1. CE PE Exam Study Guide II

      Study guide for the NCEES Computer Engineering PE Exam  
{{saved book
|title=
|subtitle=
|cover-image=
|cover-color=
| setting-papersize = Letter
| setting-showtoc = 1
| setting-columns = 2
}}

CE PE Exam Study Guide II

Study guide for the NCEES Computer Engineering PE Exam

This is a Study Guide for the NCEES Computer Engineering PE Exam. If you know all of the information in this Wiki Book and you have a solid background in computer circuits, then you stand a good chance to pass the CE PE Exam. I strongly suggest that you review ALL of the listed Wikipedia Pages before taking the CE PE Exam. I passed the exam on the first try with this study guide -- I printed it 4-up (4 paged to one sheet of paper in a 3 ring binder). You should also have the materials available from an organization like ppi2pass.com (EE reference, approved calculator, NCEES CE PE Sample Questions). Do not be afraid to take all of your reference materials with you to the test -- that is what everyone else will do.

Thanks to Ryan Boyle for creating a first pass at this book -> http://en.wikipedia.org/wiki/User:Ryanboyle2009/Books/PE. That was the inspiration for this much larger WikiBook. Kudos to Ryan!

Note: This WikiBook will not render due to small bugs in a couple of pages that need repairing. Please contact https://en.wikipedia.org/wiki/User:Clemenzi if you need to print it out and I will tell you what I know. If you try and it does render, then please edit out this line.

Part 1 - Basics
Character Encoding

Character (computing)

Universal Character Set

IEEE 1394

ASCII

Math

Bitwise operation

Signed number representations

IEEE floating point

Operators in C and C++

De Morgan's laws

Booth's multiplication algorithm

Binary multiplier

Wallace tree

Dadda multiplier

Multiply–accumulate operation

Big O notation

Euler's identity

Basic Electronics

Series and parallel circuits

RLC circuit

Transistor

Operational amplifier applications

Signal Processing

Signal processing

Digital filter

Fast Fourier transform

Cooley–Tukey FFT algorithm

Modified discrete cosine transform

Digital signal processing

Analog-to-digital converter

Error Detection/Correction

Parity bit

Error detection and correction

Cyclic redundancy check

Hamming code

Hamming(7,4)

Convolutional code

Forward error correction

Noisy-channel coding theorem

Modulation

Signal-to-noise ratio

Linear code

Noise (electronics)

Part 2 - Hardware
Hardware

Logic family

Multi-level cell

Flip-flop (electronics)

Race condition

Binary decision diagram

Circuit minimization for Boolean functions

Karnaugh map

Quine–McCluskey algorithm

Integrated circuit design

Programmable Logic

Standard cell

Programmable logic device

Field-programmable gate array

Complex programmable logic device

Application-specific integrated circuit

Logic optimization

Register-transfer level

Floorplan (microelectronics)

Hardware description language

VHDL

Verilog

Electronic design automation

Espresso heuristic logic minimizer

Routing (electronic design automation)

Static timing analysis

Placement (EDA)

Power optimization (EDA)

Timing closure

Design flow (EDA)

Design closure

Rent's rule

Assembly/Test

Design rule checking

SystemVerilog

In-circuit test

Joint Test Action Group

Boundary scan

Boundary scan description language

Test bench

Ball grid array

Head in pillow (metallurgy)

Pad cratering

Land grid array

Processors

Computer architecture

Harvard architecture

Processor design

Central processing unit

Microcode

Arithmetic logic unit

CPU cache

Instruction set

Orthogonal instruction set

Classic RISC pipeline

Reduced instruction set computing

Instruction-level parallelism

Instruction pipeline

Hazard (computer architecture)

Bubble (computing)

Superscalar

Parallel computing

Dynamic priority scheduling

Amdahl's law

Benchmark (computing)

Moore's law

Computer performance

Supercomputer

SIMD

Multi-core processor

Explicitly parallel instruction computing

Simultaneous multithreading

Redundancy & Reliability

Dependability

Active redundancy

Dual modular redundancy

Triple modular redundancy

High-availability Seamless Redundancy

N-version programming

RAID

Fault tolerance

Fault-tolerant computer system

Watchdog timer

Redundant array of independent memory

Memory

Computer data storage

Memory controller

Memory management unit

Static random-access memory

Dynamic random-access memory

Synchronous dynamic random-access memory

DDR2 SDRAM

Flash memory

Memory scrubbing

Data striping

Hard disk drive performance characteristics

Disk sector

Part 3 - OS, Software, Testing, AI
Operating Systems

Operating system

Multiprocessing

Concurrent computing

Computer cluster

Distributed computing

Trusted computing base

Embedded system

In-circuit emulator

Real-time operating system

Comparison of real-time operating systems

Rate-monotonic scheduling

Earliest deadline first scheduling

Least slack time scheduling

Deadline-monotonic scheduling

Round-robin scheduling

O(1) scheduler

Thread (computing)

Concurrency control

Synchronization (computer science)

Mutual exclusion

Device driver

Software Development

Software development process

Software requirements specification

Spiral model

Agile software development

Behavior-driven development

Cowboy coding

Lean software development

Extreme programming

Structured systems analysis and design method

List of software development philosophies

Programming language generations

Comparison of programming languages

Printf format string

Programming paradigm

Object-oriented design

Software documentation

Software design document

Object-oriented programming

Architecture-centric design method

Concurrent Versions System

Software maintenance

Revision control

Software configuration management

Software release life cycle

MIL-STD-498

Software assurance

Systems development life cycle

Software quality

Software quality management

Relational database

ACID

List of data structures

Semipredicate problem

Application Interface Specification

Homoiconicity

Domain-specific modeling

Unified Modeling Language

Test/Integration

Software testing

Test-driven development

Acceptance test-driven development

Integration testing

Software walkthrough

Code review

Software inspection

Software verification

Functional testing

Software testing

White-box testing

Black-box testing

Gray box testing

Verification and validation (software)

Correctness (computer science)

AI & Robotics

Speech processing

Image processing

Computer vision

Robotics

Speech recognition

Part 4 - Information Theory, Encryption, Networking, and Security
Information Theory

Information theory

Channel capacity

Shannon–Hartley theorem

Nyquist–Shannon sampling theorem

Shannon's source coding theorem

Zero-order hold

Data compression

Modulation order

Phase-shift keying

Encryption

Hash function

List of hash functions

String searching algorithm

Avalanche effect

Rabin–Karp algorithm

Burst error-correcting code

Cryptography

Cryptographic hash function

Public-key cryptography

Viterbi algorithm

Networking

Computer network

List of network buses

Wide area network

Local area network

Network science

Non-return-to-zero

Manchester code

Ethernet

Internet

OSI model

Transmission Control Protocol

Point-to-Point Protocol

Exposed node problem

Circuit switching

Fiber-optic communication

Capacity management

Bandwidth management

Bandwidth (computing)

Throughput

Networking hardware

Wireless network

IEEE 802.11

Complementary code keying

Session Initiation Protocol

Message authentication code

Port Control Protocol

Network monitoring

Simple Network Management Protocol

Measuring network throughput

Reliability (computer networking)

Channel access method

Time division multiple access

Security

Computer security

Separation of protection and security

Information security

Information security management system

Internet security

Hacker (computer security)

DMZ (computing)

Firewall (computing)

Stateful firewall

Intrusion detection system

Denial-of-service attack

IP address spoofing

Part 5 - Misc

Multiple-criteria decision analysis

Additional Materials

I have links to some additional materials that I will add when I get a chance -- mainly examples of VHDL and Karnaugh Map work.

{{BookCat}}{{Subjects|Computer_engineering}}
随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/10 13:03:09