User:Tamas413/Books/CE PE Exam Study Guide II

Study guide for the NCEES Computer Engineering PE Exam
This is a Study Guide for the NCEES Computer Engineering PE Exam. If you know all of the information in this Wiki Book and you have a solid background in computer circuits, then you stand a good chance to pass the CE PE Exam. I strongly suggest that you review ALL of the listed Wikipedia Pages before taking the CE PE Exam. I passed the exam on the first try with this study guide -- I printed it 4-up (4 paged to one sheet of paper in a 3 ring binder). You should also have the materials available from an organization like ppi2pass.com (EE reference, approved calculator, NCEES CE PE Sample Questions). Do not be afraid to take all of your reference materials with you to the test -- that is what everyone else will do.

Thanks to Ryan Boyle for creating a first pass at this book -> http://en.wikipedia.org/wiki/User:Ryanboyle2009/Books/PE. That was the inspiration for this much larger WikiBook. Kudos to Ryan!

Note: This WikiBook will not render due to small bugs in a couple of pages that need repairing. Please contact https://en.wikipedia.org/wiki/User:Clemenzi if you need to print it out and I will tell you what I know. If you try and it does render, then please edit out this line.

Character Encoding

 * Character (computing)
 * Universal Character Set
 * IEEE 1394
 * ASCII

Math

 * Bitwise operation
 * Signed number representations
 * IEEE floating point
 * Operators in C and C++
 * De Morgan's laws
 * Booth's multiplication algorithm
 * Binary multiplier
 * Wallace tree
 * Dadda multiplier
 * Multiply–accumulate operation
 * Big O notation
 * Euler's identity

Basic Electronics

 * Series and parallel circuits
 * RLC circuit
 * Transistor
 * Operational amplifier applications

Signal Processing

 * Signal processing
 * Digital filter
 * Fast Fourier transform
 * Cooley–Tukey FFT algorithm
 * Modified discrete cosine transform
 * Digital signal processing
 * Analog-to-digital converter

Error Detection/Correction

 * Parity bit
 * Error detection and correction
 * Cyclic redundancy check
 * Hamming code
 * Hamming(7,4)
 * Convolutional code
 * Forward error correction
 * Noisy-channel coding theorem
 * Modulation
 * Signal-to-noise ratio
 * Linear code
 * Noise (electronics)

Hardware

 * Logic family
 * Multi-level cell
 * Flip-flop (electronics)
 * Race condition
 * Binary decision diagram
 * Circuit minimization for Boolean functions
 * Karnaugh map
 * Quine–McCluskey algorithm
 * Integrated circuit design

Programmable Logic

 * Standard cell
 * Programmable logic device
 * Field-programmable gate array
 * Complex programmable logic device
 * Application-specific integrated circuit
 * Logic optimization
 * Register-transfer level
 * Floorplan (microelectronics)
 * Hardware description language
 * VHDL
 * Verilog
 * Electronic design automation
 * Espresso heuristic logic minimizer
 * Routing (electronic design automation)
 * Static timing analysis
 * Placement (EDA)
 * Power optimization (EDA)
 * Timing closure
 * Design flow (EDA)
 * Design closure
 * Rent's rule

Assembly/Test

 * Design rule checking
 * SystemVerilog
 * In-circuit test
 * Joint Test Action Group
 * Boundary scan
 * Boundary scan description language
 * Test bench
 * Ball grid array
 * Head in pillow (metallurgy)
 * Pad cratering
 * Land grid array

Processors

 * Computer architecture
 * Harvard architecture
 * Processor design
 * Central processing unit
 * Microcode
 * Arithmetic logic unit
 * CPU cache
 * Instruction set
 * Orthogonal instruction set
 * Classic RISC pipeline
 * Reduced instruction set computing
 * Instruction-level parallelism
 * Instruction pipeline
 * Hazard (computer architecture)
 * Bubble (computing)
 * Superscalar
 * Parallel computing
 * Dynamic priority scheduling
 * Amdahl's law
 * Benchmark (computing)
 * Moore's law
 * Computer performance
 * Supercomputer
 * SIMD
 * Multi-core processor
 * Explicitly parallel instruction computing
 * Simultaneous multithreading

Redundancy & Reliability

 * Dependability
 * Active redundancy
 * Dual modular redundancy
 * Triple modular redundancy
 * High-availability Seamless Redundancy
 * N-version programming
 * RAID
 * Fault tolerance
 * Fault-tolerant computer system
 * Watchdog timer
 * Redundant array of independent memory

Memory

 * Computer data storage
 * Memory controller
 * Memory management unit
 * Static random-access memory
 * Dynamic random-access memory
 * Synchronous dynamic random-access memory
 * DDR2 SDRAM
 * Flash memory
 * Memory scrubbing
 * Data striping
 * Hard disk drive performance characteristics
 * Disk sector

Operating Systems

 * Operating system
 * Multiprocessing
 * Concurrent computing
 * Computer cluster
 * Distributed computing
 * Trusted computing base
 * Embedded system
 * In-circuit emulator
 * Real-time operating system
 * Comparison of real-time operating systems
 * Rate-monotonic scheduling
 * Earliest deadline first scheduling
 * Least slack time scheduling
 * Deadline-monotonic scheduling
 * Round-robin scheduling
 * O(1) scheduler
 * Thread (computing)
 * Concurrency control
 * Synchronization (computer science)
 * Mutual exclusion
 * Device driver

Software Development

 * Software development process
 * Software requirements specification
 * Spiral model
 * Agile software development
 * Behavior-driven development
 * Cowboy coding
 * Lean software development
 * Extreme programming
 * Structured systems analysis and design method
 * List of software development philosophies
 * Programming language generations
 * Comparison of programming languages
 * Printf format string
 * Programming paradigm
 * Object-oriented design
 * Software documentation
 * Software design document
 * Object-oriented programming
 * Architecture-centric design method
 * Concurrent Versions System
 * Software maintenance
 * Revision control
 * Software configuration management
 * Software release life cycle
 * MIL-STD-498
 * Software assurance
 * Systems development life cycle
 * Software quality
 * Software quality management
 * Relational database
 * ACID
 * List of data structures
 * Semipredicate problem
 * Application Interface Specification
 * Homoiconicity
 * Domain-specific modeling
 * Unified Modeling Language

Test/Integration

 * Software testing
 * Test-driven development
 * Acceptance test-driven development
 * Integration testing
 * Software walkthrough
 * Code review
 * Software inspection
 * Software verification
 * Functional testing
 * Software testing
 * White-box testing
 * Black-box testing
 * Gray box testing
 * Verification and validation (software)
 * Correctness (computer science)

AI & Robotics

 * Speech processing
 * Image processing
 * Computer vision
 * Robotics
 * Speech recognition

Information Theory

 * Information theory
 * Channel capacity
 * Shannon–Hartley theorem
 * Nyquist–Shannon sampling theorem
 * Shannon's source coding theorem
 * Zero-order hold
 * Data compression
 * Modulation order
 * Phase-shift keying

Encryption

 * Hash function
 * List of hash functions
 * String searching algorithm
 * Avalanche effect
 * Rabin–Karp algorithm
 * Burst error-correcting code
 * Cryptography
 * Cryptographic hash function
 * Public-key cryptography
 * Viterbi algorithm

Networking

 * Computer network
 * List of network buses
 * Wide area network
 * Local area network
 * Network science
 * Non-return-to-zero
 * Manchester code
 * Ethernet
 * Internet
 * OSI model
 * Transmission Control Protocol
 * Point-to-Point Protocol
 * Exposed node problem
 * Circuit switching
 * Fiber-optic communication
 * Capacity management
 * Bandwidth management
 * Bandwidth (computing)
 * Throughput
 * Networking hardware
 * Wireless network
 * IEEE 802.11
 * Complementary code keying
 * Session Initiation Protocol
 * Message authentication code
 * Port Control Protocol
 * Network monitoring
 * Simple Network Management Protocol
 * Measuring network throughput
 * Reliability (computer networking)
 * Channel access method
 * Time division multiple access

Security

 * Computer security
 * Separation of protection and security
 * Information security
 * Information security management system
 * Internet security
 * Hacker (computer security)
 * DMZ (computing)
 * Firewall (computing)
 * Stateful firewall
 * Intrusion detection system
 * Denial-of-service attack
 * IP address spoofing

Part 5 - Misc

 * Multiple-criteria decision analysis

I have links to some additional materials that I will add when I get a chance -- mainly examples of VHDL and Karnaugh Map work.
 * Additional Materials


 * Main Page