User:Clemenzi/Books/CE PE Exam Study Guide II - a

Draft 12

 * Character Encoding
 * Character (computing)
 * Universal Character Set
 * IEEE 1394
 * ASCII


 * Error Detection/Correction
 * Parity bit
 * Error detection and correction
 * Cyclic redundancy check
 * Hamming code
 * Convolutional code
 * Noisy-channel coding theorem
 * Signal-to-noise ratio
 * Linear code
 * Noise (electronics)
 * Digital filter
 * Signal processing
 * Reliability (computer networking)
 * Digital signal processing
 * Analog-to-digital converter


 * Encryption
 * Hash function
 * List of hash functions
 * String searching algorithm
 * Avalanche effect
 * Rabin–Karp algorithm
 * Burst error-correcting code
 * Cryptography
 * Cryptographic hash function
 * Public-key cryptography


 * Networking
 * Computer network
 * Wide area network
 * Local area network
 * Non-return-to-zero
 * Manchester code
 * Ethernet
 * Internet
 * OSI model
 * Exposed node problem
 * Fiber-optic communication
 * Capacity management
 * Wireless network
 * IEEE 802.11
 * Session Initiation Protocol
 * Message authentication code
 * Port Control Protocol
 * Throughput


 * Hardware
 * Transistor
 * Operational amplifier applications
 * Logic family
 * Multi-level cell
 * Flip-flop (electronics)
 * Programmable logic device
 * Field-programmable gate array
 * Integrated circuit design
 * Joint Test Action Group
 * Application-specific integrated circuit
 * Standard cell
 * Hardware description language
 * VHDL
 * Verilog
 * Logic synthesis
 * Logic optimization
 * Circuit minimization for Boolean functions
 * Viterbi algorithm
 * Karnaugh map
 * Quine–McCluskey algorithm
 * Rent's rule
 * Dynamic priority scheduling
 * Electronic design automation
 * Binary decision diagram
 * High-level synthesis
 * Espresso heuristic logic minimizer
 * Design closure


 * Math
 * IEEE floating point
 * Operators in C and C++
 * De Morgan's laws


 * Processors
 * Computer architecture
 * Processor design
 * Orthogonal instruction set
 * Reduced instruction set computing
 * Parallel computing
 * Amdahl's law
 * Benchmark (computing)


 * AI & Robotics
 * Speech processing
 * Image processing
 * Earliest deadline first scheduling
 * Computer vision
 * Robotics


 * Embedded
 * List of network buses


 * Operating Systems
 * Operating system
 * Multiprocessing
 * Computer cluster
 * Distributed computing
 * Trusted computing base
 * Embedded system
 * In-circuit emulator
 * Real-time operating system
 * Rate-monotonic scheduling
 * Least slack time scheduling
 * Speech recognition
 * Network monitoring


 * Redundancy & Reliability
 * Dependability
 * Active redundancy
 * Dual modular redundancy
 * Triple modular redundancy
 * N-version programming
 * RAID
 * Fault tolerance
 * Fault-tolerant computer system
 * Watchdog timer
 * Redundant array of independent memory


 * Information Theory
 * Information theory
 * Channel capacity
 * Shannon–Hartley theorem
 * Nyquist–Shannon sampling theorem
 * Shannon's source coding theorem
 * Zero-order hold
 * Data compression
 * Modulation order
 * Phase-shift keying


 * Software Development
 * List of software development philosophies
 * Software development process
 * Software documentation
 * Software design document
 * Object-oriented programming
 * Concurrent Versions System
 * Revision control
 * Software configuration management
 * Software release life cycle
 * Relational database
 * MIL-STD-498
 * Software assurance
 * Systems development life cycle
 * Software quality
 * Software quality management
 * ACID
 * Synchronization (computer science)
 * Circuit switching
 * Modulation
 * Forward error correction
 * Modified discrete cosine transform
 * Programming language generations
 * Complementary code keying
 * Register-transfer level
 * Comparison of programming languages
 * Complex programmable logic device
 * Design rule checking
 * SystemVerilog
 * In-circuit test
 * Boundary scan
 * Boundary scan description language
 * Ball grid array
 * Head in pillow (metallurgy)
 * Pad cratering
 * Land grid array
 * Test bench


 * Memory
 * Computer data storage
 * Memory controller
 * Static random-access memory
 * Dynamic random-access memory
 * Synchronous dynamic random-access memory
 * DDR2 SDRAM
 * Flash memory
 * Memory scrubbing
 * Data striping


 * Security
 * Computer security
 * Separation of protection and security
 * Information security
 * Information security management system
 * Hacker (computer security)
 * DMZ (computing)
 * Stateful firewall