User:Clemenzi/Books/Clemenzi/Books/CE PE Exam Study Guide IIb
The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
CE PE Exam Study Guide II[edit]
Pre-Final 2a[edit]
- Character Encoding
- Character (computing)
- Universal Character Set
- IEEE 1394
- ASCII
- Math
- Bitwise operation
- Signed number representations
- IEEE floating point
- Operators in C and C++
- De Morgan's laws
- Basic Electronics
- Series and parallel circuits
- RLC circuit
- Information Theory
- Information theory
- Channel capacity
- Shannon–Hartley theorem
- Nyquist–Shannon sampling theorem
- Shannon's source coding theorem
- Zero-order hold
- Data compression
- Modulation order
- Phase-shift keying
- Signal Processing
- Signal processing
- Digital filter
- Fast Fourier transform
- Cooley–Tukey FFT algorithm
- Modified discrete cosine transform
- Digital signal processing
- Analog-to-digital converter
- Error Detection/Correction
- Parity bit
- Error detection and correction
- Cyclic redundancy check
- Hamming code
- Convolutional code
- Forward error correction
- Noisy-channel coding theorem
- Modulation
- Signal-to-noise ratio
- Linear code
- Noise (electronics)
- Encryption
- Hash function
- List of hash functions
- String searching algorithm
- Avalanche effect
- Rabin–Karp algorithm
- Burst error-correcting code
- Cryptography
- Cryptographic hash function
- Public-key cryptography
- Viterbi algorithm
- Networking
- Computer network
- List of network buses
- Wide area network
- Local area network
- Non-return-to-zero
- Manchester code
- Ethernet
- Internet
- OSI model
- Transmission Control Protocol
- Exposed node problem
- Fiber-optic communication
- Capacity management
- Circuit switching
- Wireless network
- IEEE 802.11
- Complementary code keying
- Session Initiation Protocol
- Message authentication code
- Port Control Protocol
- Network monitoring
- Simple Network Management Protocol
- Measuring network throughput
- Reliability (computer networking)
- Channel access method
- Time division multiple access
- Hardware
- Transistor
- Operational amplifier applications
- Logic family
- Multi-level cell
- Flip-flop (electronics)
- Race condition
- Binary decision diagram
- Circuit minimization for Boolean functions
- Karnaugh map
- Quine–McCluskey algorithm
- Integrated circuit design
- ASIC/FPGA
- Standard cell
- Programmable logic device
- Field-programmable gate array
- Complex programmable logic device
- Application-specific integrated circuit
- Logic optimization
- Register-transfer level
- Floorplan (microelectronics)
- Hardware description language
- VHDL
- Verilog
- Electronic design automation
- Espresso heuristic logic minimizer
- Routing (electronic design automation)
- Static timing analysis
- Placement (EDA)
- Power optimization (EDA)
- Timing closure
- Design flow (EDA)
- Design closure
- Rent's rule
- Processors
- Computer architecture
- Processor design
- Central processing unit
- Arithmetic logic unit
- CPU cache
- Orthogonal instruction set
- Classic RISC pipeline
- Reduced instruction set computing
- Instruction-level parallelism
- Superscalar
- Parallel computing
- Dynamic priority scheduling
- Amdahl's law
- Benchmark (computing)
- Moore's law
- Computer performance
- Supercomputer
- AI & Robotics
- Speech processing
- Image processing
- Computer vision
- Robotics
- Speech recognition
- Operating Systems
- Operating system
- Multiprocessing
- Concurrent computing
- Computer cluster
- Distributed computing
- Trusted computing base
- Embedded system
- In-circuit emulator
- Real-time operating system
- Comparison of real-time operating systems
- Rate-monotonic scheduling
- Earliest deadline first scheduling
- Least slack time scheduling
- Thread (computing)
- Concurrency control
- Mutual exclusion
- Device driver
- Redundancy & Reliability
- Dependability
- Active redundancy
- Dual modular redundancy
- Triple modular redundancy
- N-version programming
- RAID
- Fault tolerance
- Fault-tolerant computer system
- Watchdog timer
- Redundant array of independent memory
- Software Development
- List of software development philosophies
- Programming language generations
- Comparison of programming languages
- Software development process
- Software documentation
- Software design document
- Object-oriented programming
- Concurrent Versions System
- Revision control
- Software configuration management
- Software release life cycle
- MIL-STD-498
- Software assurance
- Systems development life cycle
- Software quality
- Software quality management
- Relational database
- ACID
- Synchronization (computer science)
- Memory
- Computer data storage
- Memory controller
- Memory management unit
- Static random-access memory
- Dynamic random-access memory
- Synchronous dynamic random-access memory
- DDR2 SDRAM
- Flash memory
- Memory scrubbing
- Data striping
- Hard disk drive performance characteristics
- Disk sector
- Security
- Computer security
- Separation of protection and security
- Information security
- Information security management system
- Hacker (computer security)
- DMZ (computing)
- Firewall (computing)
- Stateful firewall
- Intrusion detection system
- Denial-of-service attack
- IP address spoofing
- Assembly/Test
- Design rule checking
- SystemVerilog
- In-circuit test
- Joint Test Action Group
- Boundary scan
- Boundary scan description language
- Test bench
- Ball grid array
- Head in pillow (metallurgy)
- Pad cratering
- Land grid array
- Networking hardware
- Object-oriented design
- List of data structures
- Software maintenance
- Deadline-monotonic scheduling
- Round-robin scheduling
- Booth's multiplication algorithm
- Binary multiplier
- Wallace tree
- Dadda multiplier
- Multiply–accumulate operation
- Harvard architecture
- Instruction pipeline
- Hazard (computer architecture)
- Bubble (computing)
- Semipredicate problem
- Application Interface Specification
- Homoiconicity
- Domain-specific modeling
- Unified Modeling Language
- Printf format string
- Programming paradigm
- Agile software development
- Behavior-driven development
- Cowboy coding
- Lean software development
- Test-driven development
- Extreme programming
- Integration testing
- Structured systems analysis and design method
- Acceptance test-driven development
- Network science
- Software verification
- Verification and validation (software)
- Correctness (computer science)
- Software requirements specification
- Software testing
- Software walkthrough
- Code review
- Software inspection