cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Journal
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Education,
JAKSTIK jurnal adalah kumpulan jurnal penelitian dari semua fakultas yang ditulis oleh dosen dan mahasiswa STMIK Jakarta. Kami jurnal yang diterbitkan setiap 6 bulan yang menunjukkan jurnal Studi yang berbeda Program studi.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 4, No 1 (2005): JOURNAL" : 8 Documents clear
TERMS DICTIONARY COMPUTER APPLICATIONS USING VISUAL BASIC 6.0 SOFTWARE Diana Desy
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Every field of science have their own terms in the fields of science, as well as a lot ofcomputer science that there are terms in it, generally only those who learn the computer onlyunderstands these terms. To help find out the computer terms, the writer tries to make theApplication Dictionary of Computer Terms with Visual Basic 6.0. Discussion
MOTIVATION MODEL-BASED COMMUNICATION SYSTEM E-LEARNING Eriek Orlando
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ELearning System is a solution that is needed in the era of globalization of education today.The presence of eLearning with the support of information technology to bring the influenceof conventional education in the transformation process into digital form, both in content andsystem. Today eLearning industry is experiencing a crisis, which resulted in the failure of theimplementation of eLearning in various sectors in the world. The failure was mainly due tovery few users and are not motivated to finish until the end of eLearning materials. Writingprovides a solution by developing a model-based eLearning system that can motivate thecommunity to overcome the low motivated users and not users in using the eLearning system.Community motivation model developed based on theories of learning and motivation theorycapturing requirements in the field of requirements engineering. Measurement of theeffectiveness of community motivation model using statistical indicators of visits, trafficranking, comparison with similar eLearning system, and relationships between concepts inthe model. The model developed has also been applied in a public web based eLearningsystem IlmuKomputer.Com, with a significant result.
MAKING APPLICATION DESIGN DIAGRAM plot (flowchart) Hariyanto Hariyanto
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As technology advances and information age, the programming language progress veryrapidly, both in usage and in making program.Programming languages and algorithms necessary if a problem should be solved throughcomputer technology, in order to save time and simplify their use.In general, before a problem solved through a programming language, first the problem wassolved through a flowchart diagram, the tool graphically depiction of the steps and thesequence of procedures of a program. Flowchart to help analysts and programmers to solvethe problem into segments that are smaller and help in analyzing alternatives in the operation.Flowchart usually facilitate the settlement of a problem, especially problems that need to befurther studied and evaluated.
DATA ACQUISITION SYSTEM THROUGH THE INTERNET NETWORK CASE STUDY ROOM TEMPERATURE MEASUREMENT WITH SENSOR DS1621 Indrianto Indrianto
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sensor in industrial and other much needed because with the sensor adannya industrial areascan be easily able to control equipment remotely. The sensor can be used if there is a series ofADC and DAC, and required a calibration for the sensor can measure an exact quantity. Byusing DS1621 sensors then it is not necessary because the DS1621 is a sensor that 'smart'(Intelegent sensor). DS1621 does not require the microcontroller and does not requirecalibration.Temperature Measuring Equipment Design Room With DS1621 Sensor Networks ThroughInternet-Based Personal is a tool for censorship that uses DS1621 temperature. Data sent bythe temperature sensor can be taken via the Internet network so that this equipment can beaccessed from anywhere as long as it is connected to the internet. This circuit has atemperature of 125 C-20 .......+ Software used to display the results of temperaturemeasurement is HTML. Use the Windows 2000 server as a server on this design is veryhelpful. Since making almost all computer activity becomes easier, faster and fully integratewith the Internet because there are DNS (Domain Name System) and IIS (InternetInformation Service).
COMPUTER CRIME Ristyawati Ristyawati
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer crime can be categorized as crimes of "White Colar Crime", which operates inmore use of the mind or brain. Definition of Cyber crime is any act that harm others orcertain parties who performed on digital media or with the aid of digital devices.
BANK HEALTH ANALYSIS BEFORE AND AFTER X RECAPITALIZATION VIEWED FROM EQUITY CAPITAL FACTORS, QUALITY OF PRODUCTIVE ASSETS, PROFITABILITY AND LIQUIDITY Soegijanto Soegijanto
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the deregulation of Banking conducted by the government through June 1, 1983package which gives freedom to banks in determining credit limits provided within itscapabilities and determine the interest rates of deposits and savings. October 27, 1998package provides ease in setting up the opening of the Bank and Branch. From both of thesepackages have an impact on the increasing number of banks (both head office and branches),so the competition to attract funds from the public has increased.Bank Indonesia as a supervisor and coach of the National Banking require control of the bank- a bank it to know the financial condition and operations of each bank. Bank Indonesia, helda regular basis by assessing the supervision standard tehadap bank soundness based oninformation from reports such as balance sheet along with the administrative account, the listof securities held and issued, details of loans, investment details, details of profit and lossstatements and other health lain.Tingkat bank is the interest of all parties involved, both theowner and manager of the bank, community bank service users, as well as Bank Indonesia asthe National Banking supervisors and coaches.Bank health assessment can be done with qualitative and quantitative approach to calculationof the most influential aspect of the condition and development of a bank that includesassessment of the capital factor (capital), quality of productive assets (assets), management(managerial), profitability (Earning Power) , liquidity (Liquidity), commonly called CAMEL,which can be determined from the results of the assessment of health of a bank predicate.For banks that get a bad title, but can meet the requirements specified by the Governmentmay be included daam Recapitalization programs, thus increasing the value of its CapitalAdequacy Ratio.
ACCOUNTING STUDENTS PERCEPTION OF ETHICS PREPARATION TO THE FINANCIAL STATEMENTS Sukirman Sukirman
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to examine differences in perceptions of accounting students to ethicalfinancial statements, among students who already take a course in ethics education tostudents who have not take a course in ethics education. Analysis based on data from 134respondents via the research collection used by researchers kuesioner.Metode Mann Whitneytest was used to examine differences in perceptions of students towards the preparation offinancial reports and test students' responsibility over financial reporting, whereas the T-TestTest used to test differences in perception between men and wanita.Hasil research shows thatthere are significant differences between students who have taken ethics education to studentswho have not taken ethics education. Students who have taken ethics education has a goodperception of the ethical preparation of financial statements compared with students whohave not taken ethics education. As for responsibility in reporting of financial information ofstudents who have not taken ethics education are higher than the students who have not takenethics education. This means that the accounting curriculum at universities is considered notenough to give stock ethics to the students to plunge into the world of work.
DESIGNING AND MAKING authentication server DISTRIBUTED SYSTEM BASED ON XML Yudi Irawan Chandra
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Not completely secure computer networks from a variety of attacks and weaknesses of thesystem that can be exploited so that it can cause overall system failure. On the other hand,handling the security aspects of the application is still done in conjunction with thedevelopment of business processes so that the resulting system will not become effective ifthe application has many users with a variety of diverse access rights. In addition, efforts tointegrate various kinds of applications become more complex because each application has itsown method with limitations on certain platforms. Based on this background developed anauthentication server. How the authentication server is the first time by listing all theattributes In addition, registration applications must also include a list of users and accessrights. Client application then sends the user data and applications to a server identityauthentication each time a user login request. Before data is sent, the data is encrypted andthen converted to XML format. Arriving on the server, the data is then translated into textform and then decrypted into plaintext. These data are used as parameters to be validated byfirst passing the port knocking. If the validation is successful port knocking, then the specialsession will be created for that user. Then the session will be returned to the application to beprocessed further. Almost the same process also applies if the user requesting access to aprocedure. The difference lies in the validation process which involves the examination of thevalidity of the session, permissions, parameters and requirements can be met. While in thelogoff process, limit switches so that the user session is terminated can no longer perform theaccess. The existence of authentication server integration proved to facilitate a variety ofapplications under a single security system for all XML-formatted data is transferred. Inaddition, the ease of integration flexibility is also evidenced by the authentication server forcoordinating the various applications and users that use it. On the other hand, authenticationserver also serves to improve the security system shown in the form of resistance to theplaintext data reading, the man in the middle attacks and unauthorized access.

Page 1 of 1 | Total Record : 8