The SITM IT Cheat Sheet
SITM IT Niche information
Share-level security protects shared network resources on the computer with individually
assigned passwords.
Encryption is the process that uses an algorithm to transform data stored in a database into
"cipher text" that is incomprehensible without first being decrypted.
Port filtering is when a firewall monitors the ports of the network protocol packets that pass
through it.
Keys
Composite/Compound/Concatenated Keys
A composite key is the combination of two or more fields to form a primary key. For
example (StudentID, IDNumber) and (StudentID, IDNumber, Name) are composite keys.
- Unrelated objects
Normalisation avoids these design problems:
1. Repeating Groups - (Eg. Sports)
2. Data redundancy
3. Anomalies
1
, The SITM IT Cheat Sheet
In a normalised database, all fields should have a single value. The data in a cell cannot
store multiple values.
A transitive dependency is when a field's value is dependent on a non-key field.
1NF No repeating groups. Choose a primary key.
2NF Relation is in 1NF.
No partial dependencies.
3NF Relation is in 2NF.
No transitive dependencies.
2
SITM IT Niche information
Share-level security protects shared network resources on the computer with individually
assigned passwords.
Encryption is the process that uses an algorithm to transform data stored in a database into
"cipher text" that is incomprehensible without first being decrypted.
Port filtering is when a firewall monitors the ports of the network protocol packets that pass
through it.
Keys
Composite/Compound/Concatenated Keys
A composite key is the combination of two or more fields to form a primary key. For
example (StudentID, IDNumber) and (StudentID, IDNumber, Name) are composite keys.
- Unrelated objects
Normalisation avoids these design problems:
1. Repeating Groups - (Eg. Sports)
2. Data redundancy
3. Anomalies
1
, The SITM IT Cheat Sheet
In a normalised database, all fields should have a single value. The data in a cell cannot
store multiple values.
A transitive dependency is when a field's value is dependent on a non-key field.
1NF No repeating groups. Choose a primary key.
2NF Relation is in 1NF.
No partial dependencies.
3NF Relation is in 2NF.
No transitive dependencies.
2