The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by adinayasmeen2003, 2021-10-28 11:24:31

assignment -9

assignment -9

ADINA YASMEEN BINTI EDERUS
18DSK21F1050





ADINA YASMEE
030503

Program / P

ADINA YASMEEN BINTI EDERUS

CERTIFICATE 18DSK21F1050
of ACHIEVEMENT

EN BINTI EDERUS
3110090

Project Name







CHAPTER 1

1. What is the important of computer of system in accounting ?

A Important efficiency C Increase work
B Save time D Transaction

2. The following are characteristics of the system except

A Relevant C Reliability
B Widely D Accessibility

3. What is the timely mean ? C Provided in time for decision
D makers to make decision
A Free from error or bias; accurately Available to users when they need it
represent organization events or activites and in a format they can use

B Presented in a useful and intelligible
format

4. How many components in accounting system ?

A4 C 6
B5 D 7

5. The following are components in accounting system except

A People C Software
B Infrastructure D Input

6. What can sharing knowledge give you ?

A Improve separation and provide a C Provide adequate controls to safe guard
competitive advantage D Reduce uncertainly

B Allowing customers to directly access
inventory

7. What is the function of document

A Used by employs to control operational C Records of transaction or other

activities company data

B An agreement between two entities D Recording the accounting events of a

company

8. Which of the following are the data processing ?

I. Creating

II. Reading

III. Updating

IV. Deleting

A I, II C I,II,III
All
B I,III D

ADINA YASMEEN BINTI EDERUS
18DSK21F1050

9. How many precess of accounting cycle ? C 8
A4 D 10
B6

10. Which way are correct for accounting cycle ?
AC

Identify Post ledger Record Financial Post ledger adjusted
transaction entries journal statements entries entries

BD

Recod Post ledger unadjusted Identify financial close your
journal entries trial transaction stements books
entries
banlance

11. What does program flowchart shows? C The sequence of logical operations
A The relationship among the input D computer
The flow of document and
processing and output in an information. information between departments
B Graphical descriptions of the business or areas of responsibility

processes

12. The following are five major transaction cycles, except for

A Revenue cycle C Financing cycle
B Expenditure cycle D Production or conversion cycle

13. Which symbol is data flows ? C
A D
B

14. “An electronic or paper document or report.”This explanation is

A Electronic output C Document
B Electronic data entry D Multiple copies of one paper document

15. Which symbol is data base ? ADINA YASMEEN BINTI EDERUS
A 18DSK21F1050

B C
D

16. What is an explanation for off-page connector ? Paper based accounting jumbles and
A An entry form , on an exit to , another page C ledgers
Data stored electronically in a database
B A decision making step D

17. Which symbols is annotation ? C
A

BD

18. What symbol mean end ? C
A D

B

19. Where are the digital data of cloud storage stored ?

A RAM C USB
B Logical pools D Memory card

20. How much of free storage is given in Microsoft ? ADINA YASMEEN BINTI EDERUS
18DSK21F1050
A 100GB C
B None D 5GB
15GB

Chapter 2

1. What I the purpose of email security and privacy ?

A Let hackers can hack into your account C Avoid disclosure of personal
information
B Avoid hackers from intercepting opening D Personal information is not important
and reading your email

2. The following are the elements of strong passwords except

A Minimum 12 characters C Lower case letters
B Capital letters D Emoji

3. The following are practise for securing online and network transaction to prevent except

A Protect your computer against threats C Use strong passwords and if possible
use OTP during transaction
B Look for the sign that show that your
information is safe D Ensure the use of Virtual Public
Network

4. How to look for the signs that show that your information is safe?

A Before you enter sensitive data, ensure C Ensure you are putting unknown flash

that the site uses SSL certificate that drives to your computer, and use them

makes sure that all the communication cautiously

between your and the website is

encrypted

B Use of VPN increases your transaction is D Put a protective barrier between your PC

privacy and security as VPN security model and the internet

ensure confidentiality with sender

authentication and message integrity

5. Definition of online predators is C The gaining of unauthorized access to
D data in a system or computer
A Adult online users who seek to expiate
vulnerable children or other abusive All above
purposes

B The role a form plays in the network and
how it is linked directly and indirectly to
other firms in the network

ADINA YASMEEN BINTI EDERUS
18DSK21F1050

6. The following are characteristics of online preclear except

A Learn common traits or predators C Be wary of requests to meet
B Understand grooming D Verbal attack

7. Which are ways to prevent online predator ?

I. Talk to your child , make it clear that you are worried it

II. Check your computer make sure that you have security software istalled

III. Report to the police

IV. Avoid going into a private chat room

A I and II C I,II,III

B I and III D All

8. Why purchase safety software is important ?

I. It can send alters when someone tries to access questionable sites

II. It can record all online activity

III. It can prevent new windows from opening

IV. It can upgrade software

A I and II C I,II,III

B I and III D All

9. Where ethics awareness should must begin ?

A From friend that are in the wrong path C School and at home
B Tuition D universities

10. Which one is the mahor components of a computer system ?

A Display monitor C Memory modules
B Software D USB

11. Which computers can be touched by the human hand ?

A Hardware C Software
B Human ware D Motherhand

12. What is the use of spyware threats ? C Compromise credit card information
D Lock you out your data
A Monitors online activities or install
programs without your consent

B To alter the way a computer operators

13. All these types of computer and security except

A Computer reuses C Programming software
B Hackers and predators D Spyware threats

ADINA YASMEEN BINTI EDERUS
18DSK21F1050

14. What is internet scams ? C Collect and transmit private
A Your activity tracked online information

B Create computer security threats and D Schemes that deceive the user in
malware various ways to take advantage of
them

15. How to prevent and recover from the nature and security threat ?

A Programming software C Malware
B Keep your operating system current D Spyware threats

16. Why you shouldn’t not use free Wi-Fi ? C Exposing personal data
D Can be exposed to unnecessary things
A Many important data can be accessed to
that network

B Easy to be backup files

17. What happens if we use the same email address or username ?

A Data will be stored easily C Safe to keep it all some
B Easy to remember D It takes only seconds to hack your

account

18. All there dare the best ways to protect your computer except

A Use a firewall C Keep all software to date
B Think before you click D Browse the web safely

19. If you run windows 7 , what can you download for free ?

A Windows 10 C Microsoft 8
B Microsoft security essentials D Microsoft office

20. What is the role of email encryption ? C Protects confidential information
D Avoid display of personal information
A To display the account’information
B Let hackers to hack easily

ADINA YASMEEN BINTI EDERUS
18DSK21F1050



18DSK21F1050 ADINA YASMEEN
BINTI EDERUS



ADINA YASMEEN BINTI EDERUS
18DSK21F1050

1|Page



BERKUDA

KPENGENALAN
UDA (Horse) ialah sejenis mamalia bersaiz besar yang
mempunyai bilangan jari kaki yang ganjil dan
merupakan salah satu daripada sepuluh spesies moden
haiwan daripada keluarga Equus. Nama saintifiknya Equus
caballus atau pun Equus ferus caballus. Kuda telah lama
merupakan salah satu haiwan belaan manusia yang jinak dan
ia amat penting daripada segi ekonomi, serta memainkan
peranan yang penting dalam pengangkutan orang dan barang
muatan selama beribu-ribu tahun. Aktiviti menternak kuda

2|Page



agak terpencil mungkin terjadi seawal 10,000 tahun dahulu
dimana ada bukti yang jelas terhadap penggunaan kuda
secara meluas oleh manusia bertarikh pada sekitar 2000
sebelum Masehi. Kuda telah dibiakbakakan dengan teliti
supaya haiwan ini dapat ditunggangkan dan biasanya dengan
guna pelana. Haiwan ini juga boleh digunakan untuk menarik
objek-objek seperti kereta kuda atau alat membajak tanah.
Dalam pada itu haiwan kuda merupakan satu sumber
makanan, termasuk daging kuda dan juga produk tenusu
sementara ia dilarang oleh kumplan manusia lain.

A BC D

Kini kuda Saiz kuda Kuda Artikel siang

merupakan berbeza- tunggangan yang Selasa ini

haiwan untuk beza lebih besar pula sempena

kegiatan mengikut berukuran Maulidulrasul

waktu lapang baka sekurang- 1440 Hijrah

dan sukan malahan kurangnya 1.73 dalam

terutama di ia juga meter dengan blog "Anim

negara dipengar berat badan Agro

maju. Bergant uhi oleh sekitar 500 - 600 Technology" s

ung pada baka cara kilogram aya menulis

penulis blog pemakan seekor. Manusia lagi mengenai

dimaklumkan an. Kuda telah kuda dan tip

dimana kuda tunggang membiakbakaka penjagaan

jinak model an ringan n kuda selama haiwan kuda

boleh hidup lazimnya beribu-ribu sekadar

dan mampu mencapai tahun dan telah dijadikan

menjangkau tinggi 1.4 berjaya bahan

25 ke 30 2 - 1.63 dalam menghasi rujukkan.

tahun. meter lkan banyak jenis

3|Page

ADINA YASMEEN BINTI EDERUS
18DSK21F1050

dan berat baka yang
badan berbeza-beza.
sekitar Serupa dengan
380 - 550 pembiakbakaan
kilogram. anjing, kuda

telah
dibiakbakakan
supaya dapat
menghasilkan
sifat-sifat dan
keupayaan-
keupayaan yang
khusus seperti
kegunaan kuda
untuk kelajuan,
kekuatan dan
peperangan.

4| P a g e

SEJARAH

 Pada masa dahulu dimaklumkan dimana di dunia Islam di
bawah pemerintahan Khalifah Omar telah membuka era
baru dalam dunia kuda atau equestrian iaitu perkara
yang mana banyak taktik baru dipelajari dalam
peperangan berkuda. Dalam pada itu Haiwan Kuda
atau Equus caballus ialah spesies daripada famili Equidae
dan berada dalam kelas mamalia. Manusia mula
menjinakkan kuda dan mereka menjadikannya sebagai
aset yang amat penting baik dalam peperangan,
pertunjukan, sarkas, sukan, pertandingan dan
sebagainya. Perkembangan sukan berkuda di Malaysia
semakin meningkat dalam banyak disiplin antaranya
dressage, showjumping dan endurance. Menunggang
kuda juga boleh dijadikan sebagai terapi kepada penyakit
artritis, sindrom down, autisme, sakit tulang belakang
dan membantu mencerahkan penglihatan mata melalui
rangsangan asas terhadap saraf cranium (tengkorak)
semasa gerakan 'galloping' kuda serta bermacam
lagi. Terdapat beberapa baka kuda seperti Arab,
Thoroughbred, Quarter Horse, Appaloosa dan Hunter.
Sistem pengurusan kuda yang baik boleh menentukan
status kesihatan kuda, keselesaan dan keupayaan kuda
melakukan kerja.

5|Page



PENUTUP

Dalam memelihara kuda beberapa aspek penting mengenai
pengurusan perlu diberi perhatian seperti stable, sarap,
penjagaan kaki, latihan, peralatan kuda dan sebagainya .Tidak
ramai orang Malaysia yang menternak kuda sebagai hobi
kecuali ternakan kuda lumba secara intensif.

5|Page


Click to View FlipBook Version