词条 | Book:CE PE Exam Study Guide II |
释义 |
|title= |subtitle= |cover-image= |cover-color= | setting-papersize = Letter | setting-showtoc = 1 | setting-columns = 2 }} CE PE Exam Study Guide IIStudy guide for the NCEES Computer Engineering PE ExamThis is a Study Guide for the NCEES Computer Engineering PE Exam. If you know all of the information in this Wiki Book and you have a solid background in computer circuits, then you stand a good chance to pass the CE PE Exam. I strongly suggest that you review ALL of the listed Wikipedia Pages before taking the CE PE Exam. I passed the exam on the first try with this study guide -- I printed it 4-up (4 paged to one sheet of paper in a 3 ring binder). You should also have the materials available from an organization like ppi2pass.com (EE reference, approved calculator, NCEES CE PE Sample Questions). Do not be afraid to take all of your reference materials with you to the test -- that is what everyone else will do. Thanks to Ryan Boyle for creating a first pass at this book -> http://en.wikipedia.org/wiki/User:Ryanboyle2009/Books/PE. That was the inspiration for this much larger WikiBook. Kudos to Ryan! Note: This WikiBook will not render due to small bugs in a couple of pages that need repairing. Please contact https://en.wikipedia.org/wiki/User:Clemenzi if you need to print it out and I will tell you what I know. If you try and it does render, then please edit out this line.
Character (computing) Universal Character Set IEEE 1394 ASCII
Bitwise operation Signed number representations IEEE floating point Operators in C and C++ De Morgan's laws Booth's multiplication algorithm Binary multiplier Wallace tree Dadda multiplier Multiply–accumulate operation Big O notation Euler's identity
Series and parallel circuits RLC circuit Transistor Operational amplifier applications
Signal processing Digital filter Fast Fourier transform Cooley–Tukey FFT algorithm Modified discrete cosine transform Digital signal processing Analog-to-digital converter
Parity bit Error detection and correction Cyclic redundancy check Hamming code Hamming(7,4) Convolutional code Forward error correction Noisy-channel coding theorem Modulation Signal-to-noise ratio Linear code Noise (electronics)
Logic family Multi-level cell Flip-flop (electronics) Race condition Binary decision diagram Circuit minimization for Boolean functions Karnaugh map Quine–McCluskey algorithm Integrated circuit design
Standard cell Programmable logic device Field-programmable gate array Complex programmable logic device Application-specific integrated circuit Logic optimization Register-transfer level Floorplan (microelectronics) Hardware description language VHDL Verilog Electronic design automation Espresso heuristic logic minimizer Routing (electronic design automation) Static timing analysis Placement (EDA) Power optimization (EDA) Timing closure Design flow (EDA) Design closure Rent's rule
Design rule checking SystemVerilog In-circuit test Joint Test Action Group Boundary scan Boundary scan description language Test bench Ball grid array Head in pillow (metallurgy) Pad cratering Land grid array
Computer architecture Harvard architecture Processor design Central processing unit Microcode Arithmetic logic unit CPU cache Instruction set Orthogonal instruction set Classic RISC pipeline Reduced instruction set computing Instruction-level parallelism Instruction pipeline Hazard (computer architecture) Bubble (computing) Superscalar Parallel computing Dynamic priority scheduling Amdahl's law Benchmark (computing) Moore's law Computer performance Supercomputer SIMD Multi-core processor Explicitly parallel instruction computing Simultaneous multithreading
Dependability Active redundancy Dual modular redundancy Triple modular redundancy High-availability Seamless Redundancy N-version programming RAID Fault tolerance Fault-tolerant computer system Watchdog timer Redundant array of independent memory
Computer data storage Memory controller Memory management unit Static random-access memory Dynamic random-access memory Synchronous dynamic random-access memory DDR2 SDRAM Flash memory Memory scrubbing Data striping Hard disk drive performance characteristics Disk sector
Operating system Multiprocessing Concurrent computing Computer cluster Distributed computing Trusted computing base Embedded system In-circuit emulator Real-time operating system Comparison of real-time operating systems Rate-monotonic scheduling Earliest deadline first scheduling Least slack time scheduling Deadline-monotonic scheduling Round-robin scheduling O(1) scheduler Thread (computing) Concurrency control Synchronization (computer science) Mutual exclusion Device driver
Software development process Software requirements specification Spiral model Agile software development Behavior-driven development Cowboy coding Lean software development Extreme programming Structured systems analysis and design method List of software development philosophies Programming language generations Comparison of programming languages Printf format string Programming paradigm Object-oriented design Software documentation Software design document Object-oriented programming Architecture-centric design method Concurrent Versions System Software maintenance Revision control Software configuration management Software release life cycle MIL-STD-498 Software assurance Systems development life cycle Software quality Software quality management Relational database ACID List of data structures Semipredicate problem Application Interface Specification Homoiconicity Domain-specific modeling Unified Modeling Language
Software testing Test-driven development Acceptance test-driven development Integration testing Software walkthrough Code review Software inspection Software verification Functional testing Software testing White-box testing Black-box testing Gray box testing Verification and validation (software) Correctness (computer science)
Speech processing Image processing Computer vision Robotics Speech recognition
Information theory Channel capacity Shannon–Hartley theorem Nyquist–Shannon sampling theorem Shannon's source coding theorem Zero-order hold Data compression Modulation order Phase-shift keying
Hash function List of hash functions String searching algorithm Avalanche effect Rabin–Karp algorithm Burst error-correcting code Cryptography Cryptographic hash function Public-key cryptography Viterbi algorithm
Computer network List of network buses Wide area network Local area network Network science Non-return-to-zero Manchester code Ethernet Internet OSI model Transmission Control Protocol Point-to-Point Protocol Exposed node problem Circuit switching Fiber-optic communication Capacity management Bandwidth management Bandwidth (computing) Throughput Networking hardware Wireless network IEEE 802.11 Complementary code keying Session Initiation Protocol Message authentication code Port Control Protocol Network monitoring Simple Network Management Protocol Measuring network throughput Reliability (computer networking) Channel access method Time division multiple access
Computer security Separation of protection and security Information security Information security management system Internet security Hacker (computer security) DMZ (computing) Firewall (computing) Stateful firewall Intrusion detection system Denial-of-service attack IP address spoofing
Multiple-criteria decision analysis
I have links to some additional materials that I will add when I get a chance -- mainly examples of VHDL and Karnaugh Map work. {{BookCat}}{{Subjects|Computer_engineering}} |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。