ADINA YASMEEN BINTI EDERUS
18DSK21F1050
ADINA YASMEE
030503
Program / P
ADINA YASMEEN BINTI EDERUS
CERTIFICATE 18DSK21F1050
of ACHIEVEMENT
EN BINTI EDERUS
3110090
Project Name
CHAPTER 1
1. What is the important of computer of system in accounting ?
A Important efficiency C Increase work
B Save time D Transaction
2. The following are characteristics of the system except
A Relevant C Reliability
B Widely D Accessibility
3. What is the timely mean ? C Provided in time for decision
D makers to make decision
A Free from error or bias; accurately Available to users when they need it
represent organization events or activites and in a format they can use
B Presented in a useful and intelligible
format
4. How many components in accounting system ?
A4 C 6
B5 D 7
5. The following are components in accounting system except
A People C Software
B Infrastructure D Input
6. What can sharing knowledge give you ?
A Improve separation and provide a C Provide adequate controls to safe guard
competitive advantage D Reduce uncertainly
B Allowing customers to directly access
inventory
7. What is the function of document
A Used by employs to control operational C Records of transaction or other
activities company data
B An agreement between two entities D Recording the accounting events of a
company
8. Which of the following are the data processing ?
I. Creating
II. Reading
III. Updating
IV. Deleting
A I, II C I,II,III
All
B I,III D
ADINA YASMEEN BINTI EDERUS
18DSK21F1050
9. How many precess of accounting cycle ? C 8
A4 D 10
B6
10. Which way are correct for accounting cycle ?
AC
Identify Post ledger Record Financial Post ledger adjusted
transaction entries journal statements entries entries
BD
Recod Post ledger unadjusted Identify financial close your
journal entries trial transaction stements books
entries
banlance
11. What does program flowchart shows? C The sequence of logical operations
A The relationship among the input D computer
The flow of document and
processing and output in an information. information between departments
B Graphical descriptions of the business or areas of responsibility
processes
12. The following are five major transaction cycles, except for
A Revenue cycle C Financing cycle
B Expenditure cycle D Production or conversion cycle
13. Which symbol is data flows ? C
A D
B
14. “An electronic or paper document or report.”This explanation is
A Electronic output C Document
B Electronic data entry D Multiple copies of one paper document
15. Which symbol is data base ? ADINA YASMEEN BINTI EDERUS
A 18DSK21F1050
B C
D
16. What is an explanation for off-page connector ? Paper based accounting jumbles and
A An entry form , on an exit to , another page C ledgers
Data stored electronically in a database
B A decision making step D
17. Which symbols is annotation ? C
A
BD
18. What symbol mean end ? C
A D
B
19. Where are the digital data of cloud storage stored ?
A RAM C USB
B Logical pools D Memory card
20. How much of free storage is given in Microsoft ? ADINA YASMEEN BINTI EDERUS
18DSK21F1050
A 100GB C
B None D 5GB
15GB
Chapter 2
1. What I the purpose of email security and privacy ?
A Let hackers can hack into your account C Avoid disclosure of personal
information
B Avoid hackers from intercepting opening D Personal information is not important
and reading your email
2. The following are the elements of strong passwords except
A Minimum 12 characters C Lower case letters
B Capital letters D Emoji
3. The following are practise for securing online and network transaction to prevent except
A Protect your computer against threats C Use strong passwords and if possible
use OTP during transaction
B Look for the sign that show that your
information is safe D Ensure the use of Virtual Public
Network
4. How to look for the signs that show that your information is safe?
A Before you enter sensitive data, ensure C Ensure you are putting unknown flash
that the site uses SSL certificate that drives to your computer, and use them
makes sure that all the communication cautiously
between your and the website is
encrypted
B Use of VPN increases your transaction is D Put a protective barrier between your PC
privacy and security as VPN security model and the internet
ensure confidentiality with sender
authentication and message integrity
5. Definition of online predators is C The gaining of unauthorized access to
D data in a system or computer
A Adult online users who seek to expiate
vulnerable children or other abusive All above
purposes
B The role a form plays in the network and
how it is linked directly and indirectly to
other firms in the network
ADINA YASMEEN BINTI EDERUS
18DSK21F1050
6. The following are characteristics of online preclear except
A Learn common traits or predators C Be wary of requests to meet
B Understand grooming D Verbal attack
7. Which are ways to prevent online predator ?
I. Talk to your child , make it clear that you are worried it
II. Check your computer make sure that you have security software istalled
III. Report to the police
IV. Avoid going into a private chat room
A I and II C I,II,III
B I and III D All
8. Why purchase safety software is important ?
I. It can send alters when someone tries to access questionable sites
II. It can record all online activity
III. It can prevent new windows from opening
IV. It can upgrade software
A I and II C I,II,III
B I and III D All
9. Where ethics awareness should must begin ?
A From friend that are in the wrong path C School and at home
B Tuition D universities
10. Which one is the mahor components of a computer system ?
A Display monitor C Memory modules
B Software D USB
11. Which computers can be touched by the human hand ?
A Hardware C Software
B Human ware D Motherhand
12. What is the use of spyware threats ? C Compromise credit card information
D Lock you out your data
A Monitors online activities or install
programs without your consent
B To alter the way a computer operators
13. All these types of computer and security except
A Computer reuses C Programming software
B Hackers and predators D Spyware threats
ADINA YASMEEN BINTI EDERUS
18DSK21F1050
14. What is internet scams ? C Collect and transmit private
A Your activity tracked online information
B Create computer security threats and D Schemes that deceive the user in
malware various ways to take advantage of
them
15. How to prevent and recover from the nature and security threat ?
A Programming software C Malware
B Keep your operating system current D Spyware threats
16. Why you shouldn’t not use free Wi-Fi ? C Exposing personal data
D Can be exposed to unnecessary things
A Many important data can be accessed to
that network
B Easy to be backup files
17. What happens if we use the same email address or username ?
A Data will be stored easily C Safe to keep it all some
B Easy to remember D It takes only seconds to hack your
account
18. All there dare the best ways to protect your computer except
A Use a firewall C Keep all software to date
B Think before you click D Browse the web safely
19. If you run windows 7 , what can you download for free ?
A Windows 10 C Microsoft 8
B Microsoft security essentials D Microsoft office
20. What is the role of email encryption ? C Protects confidential information
D Avoid display of personal information
A To display the account’information
B Let hackers to hack easily
ADINA YASMEEN BINTI EDERUS
18DSK21F1050
18DSK21F1050 ADINA YASMEEN
BINTI EDERUS
ADINA YASMEEN BINTI EDERUS
18DSK21F1050
1|Page
BERKUDA
KPENGENALAN
UDA (Horse) ialah sejenis mamalia bersaiz besar yang
mempunyai bilangan jari kaki yang ganjil dan
merupakan salah satu daripada sepuluh spesies moden
haiwan daripada keluarga Equus. Nama saintifiknya Equus
caballus atau pun Equus ferus caballus. Kuda telah lama
merupakan salah satu haiwan belaan manusia yang jinak dan
ia amat penting daripada segi ekonomi, serta memainkan
peranan yang penting dalam pengangkutan orang dan barang
muatan selama beribu-ribu tahun. Aktiviti menternak kuda
2|Page
agak terpencil mungkin terjadi seawal 10,000 tahun dahulu
dimana ada bukti yang jelas terhadap penggunaan kuda
secara meluas oleh manusia bertarikh pada sekitar 2000
sebelum Masehi. Kuda telah dibiakbakakan dengan teliti
supaya haiwan ini dapat ditunggangkan dan biasanya dengan
guna pelana. Haiwan ini juga boleh digunakan untuk menarik
objek-objek seperti kereta kuda atau alat membajak tanah.
Dalam pada itu haiwan kuda merupakan satu sumber
makanan, termasuk daging kuda dan juga produk tenusu
sementara ia dilarang oleh kumplan manusia lain.
A BC D
Kini kuda Saiz kuda Kuda Artikel siang
merupakan berbeza- tunggangan yang Selasa ini
haiwan untuk beza lebih besar pula sempena
kegiatan mengikut berukuran Maulidulrasul
waktu lapang baka sekurang- 1440 Hijrah
dan sukan malahan kurangnya 1.73 dalam
terutama di ia juga meter dengan blog "Anim
negara dipengar berat badan Agro
maju. Bergant uhi oleh sekitar 500 - 600 Technology" s
ung pada baka cara kilogram aya menulis
penulis blog pemakan seekor. Manusia lagi mengenai
dimaklumkan an. Kuda telah kuda dan tip
dimana kuda tunggang membiakbakaka penjagaan
jinak model an ringan n kuda selama haiwan kuda
boleh hidup lazimnya beribu-ribu sekadar
dan mampu mencapai tahun dan telah dijadikan
menjangkau tinggi 1.4 berjaya bahan
25 ke 30 2 - 1.63 dalam menghasi rujukkan.
tahun. meter lkan banyak jenis
3|Page
ADINA YASMEEN BINTI EDERUS
18DSK21F1050
dan berat baka yang
badan berbeza-beza.
sekitar Serupa dengan
380 - 550 pembiakbakaan
kilogram. anjing, kuda
telah
dibiakbakakan
supaya dapat
menghasilkan
sifat-sifat dan
keupayaan-
keupayaan yang
khusus seperti
kegunaan kuda
untuk kelajuan,
kekuatan dan
peperangan.
4| P a g e
SEJARAH
Pada masa dahulu dimaklumkan dimana di dunia Islam di
bawah pemerintahan Khalifah Omar telah membuka era
baru dalam dunia kuda atau equestrian iaitu perkara
yang mana banyak taktik baru dipelajari dalam
peperangan berkuda. Dalam pada itu Haiwan Kuda
atau Equus caballus ialah spesies daripada famili Equidae
dan berada dalam kelas mamalia. Manusia mula
menjinakkan kuda dan mereka menjadikannya sebagai
aset yang amat penting baik dalam peperangan,
pertunjukan, sarkas, sukan, pertandingan dan
sebagainya. Perkembangan sukan berkuda di Malaysia
semakin meningkat dalam banyak disiplin antaranya
dressage, showjumping dan endurance. Menunggang
kuda juga boleh dijadikan sebagai terapi kepada penyakit
artritis, sindrom down, autisme, sakit tulang belakang
dan membantu mencerahkan penglihatan mata melalui
rangsangan asas terhadap saraf cranium (tengkorak)
semasa gerakan 'galloping' kuda serta bermacam
lagi. Terdapat beberapa baka kuda seperti Arab,
Thoroughbred, Quarter Horse, Appaloosa dan Hunter.
Sistem pengurusan kuda yang baik boleh menentukan
status kesihatan kuda, keselesaan dan keupayaan kuda
melakukan kerja.
5|Page
PENUTUP
Dalam memelihara kuda beberapa aspek penting mengenai
pengurusan perlu diberi perhatian seperti stable, sarap,
penjagaan kaki, latihan, peralatan kuda dan sebagainya .Tidak
ramai orang Malaysia yang menternak kuda sebagai hobi
kecuali ternakan kuda lumba secara intensif.
5|Page