Claim Missing Document
Check
Articles

Found 9 Documents
Search

PENGENALAN DASAR MICROSOFT OFFICE DAN JARINGAN KOMPUTER Abdul Rochman; Anggada Alif Fahrizal; Fendinitius Halawa; M.Abi Syihab Alkhornain; Muhamad Thoriqul Hafidz; Nailah Rahadatul ‘Aisy; Onisimus Lengi Lowo; Selvia Rohmawati; Putra Arda Imawan; Zaid Husaini; Thoyyibah T
Abdi Jurnal Publikasi Vol. 1 No. 2 (2022): November
Publisher : Abdi Jurnal Publikasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dengan perkembangan Era serba digitalisasi ini, Dunia teknologi informasi dan komunikasi juga berkembang sangat pesat pesat. Pada abad 21, teknologi informasi dan komunikasi telah menjadi kebutuhan utama banyak orang. Melalui pemanfaatan teknologi informasi dan komunikasi, proses dan kegiatan dapat dilaksanakan dengan mudah dan efisien. Oleh karena itu, semua tingkatan perlu mempelajari pengetahuan tentang penggunaan teknologi informasi. Isi dari kegiatan ini diisi dengan pemaparan materi mengenai pengenalan dasar dasar Microsoft Office dan Jaringan Komputer. Materi ini dirasa cukup penting melihat dari siswa SMK yang bisa dibilang masuk usia produktif yang nantinya penguasaan keahlian tentang Microsoft Office dan Jaringan Komputer akan membantu sekali pada saat bekerja, belajar, berorganisasi ataupun yang lainnya. Kegiatan ini ternyata mendatangkan respons yang baik dari peserta hal ini dapat dilihat dari Hasil pemantauan selama acara menunjukkan bahwa peserta pelatihan secara aktif mengikuti pelatihan. Peserta didik berinisiatif untuk bertanya dan menanggapi materi yang diberikan oleh pembicara ataupun tutor. Hasil yang terlihat jelas dari kegiatan tersebut adalah peserta didik terkait program aplikasi Microsoft Word, Microsoft Excel, Microsoft PowerPoint dan Cisco Packet Tracer. Hampir seluruh peserta didik setelah mendapatkan pelatihan, kemampuan dan keterampilan dalam menggunakan fitur-fitur pada perangkat lunak Microsoft Word, Microsoft Excel, Microsoft PowerPoint dan Cisco Packet Tracer meningkat.
Identifying Factors Affecting the Relationship between Department and Graduation Level of Informatics Engineering Students using Apriori Algorithm: A Case Study at Pamulang University Thoyyibah T
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 1 (2023): March 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i1.6933

Abstract

To cultivate the next generation of leaders, it is essential for teenagers to receive a high level of education. Typically, this education is acquired through attending lectures that produce a high GPA, which is considered a valuable achievement for students. The level of graduation achieved within the appropriate timeframe can also impact campus accreditation, especially for engineering students, particularly those pursuing informatics engineering. To improve graduation rates, it is necessary to use data mining to identify patterns and trends among graduating students. The a priori algorithm was used in this study to analyze school majors, the length of study, and student graduation rates. Through this algorithm, it was possible to identify one or more rules that can be used as benchmarks for predicting graduation rates. Based on the results and discussions of 30 students, the most effective rule for predicting graduation is a combination of the student's previous school major, a study period of 4 years or less, a GPA of 2.51-3.00, and passing all courses on time. Using the a priori algorithm, the rule was found to have a confidence value of 16 and a support value of 71.4%. This indicates that the rule is a reliable predictor of student graduation rates.
IMPLEMENTASI SISTEM PAKAR UNTUK PENDETEKSI KERUSAKAN MOTOR DENGAN MENGGUNAKAN METODE FORWARD CHAINNING BERBASIS WEB Muhammad Aji Wisnu Perdana; Thoyyibah T
OKTAL : Jurnal Ilmu Komputer dan Sains Vol 2 No 04 (2023): OKTAL : Jurnal Ilmu Komputer Dan Sains
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Motorized vehicles are a means of transportation that are widely used so that it is not uncommon for many enthusiasts such as the convenience obtained in shortening travel time. In addition, the uniqueness of the form of motorized vehicles that have a small shape that makes it easier when driving on narrow and jammed roads. However, in addition to the convenience obtained from motorized vehicles, damage often occurs due to continuous use without paying attention to the vehicle, therefore vehicle owners are required to service the motorized vehicle. Repair errors still often occur because the submission of complaints is different from the damage on the motor, causing the motor vehicle to be damaged again a few days later and result in losses to the customer. The occurrence of this error makes the technician have to check twice to ensure the damage to the motor which takes quite a long time. customers also feel confused in determining which damage many of the customers are unfamiliar with motorcycle engines. This makes the customer feel worried that the damage to the motorbike will be exaggerated. The methods used in obtaining data are observation, insight and literature study and in system development using an expert system with the forward chaining method, the expert syste is composed of two main parts, namely the development environment and consulting environment and also helps mechanics in solving the problem of motorcycle engine damage. From the results of the study, it is hoped that the expert system can help solve problems in detecting motor damage.
Perancangan Aplikasi Penjualan Barang Pada Bedink Mattress Store Wike Rahayu; Anzal Fadly Hadi Pratama; Yusri Nuraeni; Thoyyibah T
OKTAL : Jurnal Ilmu Komputer dan Sains Vol 2 No 04 (2023): OKTAL : Jurnal Ilmu Komputer Dan Sains
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bedink Mattress Store is a company engaged in trading business. Bedink Mattress Store sells room equipment such as spring beds, rolled mattresses, sofas and pillows. In carrying out product sales activities, the company still uses manual data processing and has not yet used one of the web-based technology software, namely e-commerce. The research conducted by the author aims to create a website-based application for selling household equipment at the Bedink Mattress Store. This information system was created using the Waterfall method and was built using HTML, Javascript, Node.js, Express.js, React.jc and mongoDB languages. The results of developing this sales application can be used practically and effectively in the sales process and can be used as promotional media.
Perancangan Sistem Inventory Pada Toko Andre Ikan Hias Baresi Bahtiar; Dwi Noor Saputra; Muhamad Febriyanto; Thoyyibah T
OKTAL : Jurnal Ilmu Komputer dan Sains Vol 2 No 04 (2023): OKTAL : Jurnal Ilmu Komputer Dan Sains
Publisher : CV. Multi Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Stores engaged in the field of agricultural materials in the sale of ornamental fish. Ornamental fish is a fishery commodity that is cultivated continuously. If fishing is carried out continuously, the balance of the ecosystem will be disrupted. Therefore, there are several commodities scattered in several areas to cultivate this ornamental fish so that it does not become extinct. Build an application-based inventory information system that provides easy data management for the admin. Designing an inventory system to present information quickly and precisely. As one of the requirements for the Practical Work course in the Undergraduate (1) program for the Informatics Engineering study program at Pamulang University (UNPAM). Observation method, namely data collection that is carried out directly from observation and recording in the field. Library Method, namely data collection is done by means of data taken or collected from books related to the implementation of Job Training. Interview method, namely data collection is done by asking directly to the source. System Development, namely the preparation of a new system to replace or improve the existing system. This chapter describes several proposals or changes to the running system, and software and hardware specifications that are used as media for implementing the system to be implemented, as well as software test results by analyzing the efficiency and effectiveness of the system made compared to the running system.
Security System Exploitation on Domains and Subdomains of UIN Syarif Hidayatullah Jakarta Thoyyibah T; Wasis Haryono; Tomi Hardi
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7263

Abstract

A computer is a machine that can be used to process any information. In the computer world, crime often occurs. Thus security is needed, for computer systems to avoid various attacks. In the world of computers, especially on the Internet, virus attacks often occur, such as worms, trojans, software piracy and credit card theft problems. Despite the many offers of computer sophistication in processing information, there are still weaknesses that can be exploited by irresponsible parties. This can be detrimental to the rightful owner of the information. So that it can cause small-scale to large-scale damage. Therefore, it is very important for us to know about security exploits so that we can prevent such exploitation and avoid abuse from certain parties. although no system is completely secure. at least we have minimized the possibility by knowing security exploits. Forms of security exploitation generally use various techniques, therefore a security system is needed that is able to overcome these forms of exploitation. This study discusses how to exploit a system and its techniques with the object used is a security system in the domain and subdomain of UIN Syarif Hidayatullah Jakarta. It is hoped that with this research the reader can know and understand the exploitation techniques used so that they can prevent or treat when this exploitation technique is used. The research method used consists of several paths, namely foot printing, scanning, DOOS, Acess, Filtering, finally Covering tracks and creating a backdoor. The research output is the display of the University's network security and its exploitation process.
SOSIALISASI DAN OPTIMALISASI PENGGUNAAN INTERNET PADA USIA REMAJA DAN TRIK-TRIK BERHITUNG PADA MI MIFTAHUL HUDA DESA DANGDANG Rusyda Maulida; Thoyyibah T; Tita Puspitasari; Tomi Hardi; Wasis Haryono
PEMANAS: Jurnal Pengabdian Masyarakat Nasional Vol 1, No 1 (2021)
Publisher : PEMANAS: Jurnal Pengabdian Masyarakat Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/pemanas.v1i1.13962

Abstract

Desa Dangdang adalah salah satu desa untuk program binaan oleh Prodi Teknik Informatika Universitas Pamulang. Dangdang merupakan salah satu desa miskin yang berada di kabupaten tangerang, yang berlokasi di kecamatan Cisauk. Desa Dangdang dikategorikan sebagai desa miskin dapat dilihat dari keadaan desa yang sebagian besar penduduknya yang masih bekerja sebagai buruh serabutan, baik sebagai buruh tani, maupun buruh tambang yang penghasilannya kurang dari Rp.20.000/hari. Salah satu fasilitas di Desa Dangdang adalah MI Miftahul. Pengabdian kepada masyarakat kali ini subjeknya adalah siswa-siswa kelas 6 dan guru. Siswa siswa kelas 6 belum banyak mengenal internet. Di usia mereka yang beranjak remaja dirasa perlu pembekalan mengenai optimalisasi internet, agar mereka dapat menggunakan internet dengan bijak, mengetahui dampak positif dan negative dari penggunaan internet, dan mengetahui kejahatan online yang mungkin yang terjadi. Permasalahan lainnya yang dihadapi oleh siswa/I MI miftahul Huda adalah dalam pembelajaran Matematika. Siswa siswa/I merasa kesulitan ketika dihadapkan dengan soal operasi hitung campuran yang mencakup penjumlahan, pengurangan, perkalian dan pembagian. Tim Program Pengabdian Masyarakat (PKM) Universitas Pamulang ikut serta membantu memecahkan persoalan yang dihadapi oleh MI Miftahul Huda dengan judul PKM: “Sosialisasi dan Optimalisasi Penggunaan Internet Pada Usia Remaja dan Trik-trik Berhitung: Cara Mudah dalam Operasi Hitung di MI Miftahul Huda Desa Dangdang, Kec. Cisauk, Kab, Tangerang, Banten”. Adapun tujuan program ini adalah: (1) mendukung program pemerintah (DIKTI) secara optimal dengan langusng terjun ke masyarakat, (2) melakukan sosialisasi untuk memberikan pemahaman dan bekal kepada siswa/I tentang pengoptimalan penggunaan internet di usia remaja, (3) memberi pemahaman mengenai trik berhitung, cara mudah dalam operasi hitung.
Monitoring Dan Analisis Traffic Jaringan Internet Pada Store PT. Central Mega Kencana Dengan Software Zabbix Mohammad Bahtiar; Hendra Rahman; Triratna Rahayu Rahmawati; Nunuk Irawati; Thoyyibah T
INTECOMS: Journal of Information Technology and Computer Science Vol 7 No 3 (2024): INTECOMS: Journal of Information Technology and Computer Science
Publisher : Institut Penelitian Matematika, Komputer, Keperawatan, Pendidikan dan Ekonomi (IPM2KPE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31539/intecoms.v7i3.10323

Abstract

Masalah jaringan internet yang sering dialami oleh beberapa store di PT Central Mega Kencana adalah ketika kecepatan internet store lambat dibeberapa daerah di Indonesia maka tim store tersebut menghubungi tim IT untuk melakukan pengecekan, setelah dilakukan pengecekan terdapat beberapa store yang load pemakaian bandwidth nya cukup besar dan perlu diupgrade dari sisi layanan ISP (Internet Service Provider). Tujuan dilakukan penelitian ini adalah untuk mendapatkan data yang dapat menjelaskan bagaimana mekanisme monitoring jaringan internet store, melihat kondisi router store yang terhubung apakah terjadi down internet atau tidak serta sebagai dasar pengajuan upgrade layanan ISP yang digunakan pada setiap store. Metode yang digunakan dalam penelitian ini menggunakan metode action research. Hasil dari penelitian ini menampilkan gambar traffic jaringan dari 5 store acak yang di monitoring perhari selama 7 hari, traffic tertinggi, traffic terendah, rata-rata, dan downtime untuk rata-rata traffic. Dengan adanya software ZABBIX dapat memudahkan seorang administrator IT dalam memonitoring suatu jaringan, dan dapat juga mengetahui apabila terjadinya trouble.
OSI AND TCP/IP REFERENCE MODELS IN ISLAMIC DEVELOPMENT AND THOUGHT AND THE HISTORY OF DISCOVERY IN THE HEYDAY OF ISLAM Eka Ramdan Permana; Fajar Nugraha Wahyu; Handri Taufik; Thoyyibah T
Al-Risalah : Jurnal Studi Agama dan Pemikiran Islam Vol 15 No 2 (2024): Al-Risalah : Jurnal Studi Agama dan Pemikiran Islam
Publisher : Fakultas Agama Islam, Universitas Islam As-Syafiiyah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34005/alrisalah.v15i2.3687

Abstract

In the development of information technology, the reference model of OSI (Open Systems Interconnection) and TCP / IP (Transmission Control Protocol / Internet Protocol) has become the main foundation in the design and implementation of computer networks. However, the relationship between these models and Islamic thought and the history of discovery in the heyday of Islam has not been discussed in much depth. In this journal, we examine both reference models and relate them to Islamic thought and the history of discovery in the heyday of Islam. We highlight concepts in the OSI and TCP/IP models that may have relevance to values, principles, or scholarly contributions established by Muslim scholars in the past. also reviews how these models can provide inspiration in developing contemporary Islamic thought, especially in the context of information and communication technology. In addition, we discuss the history of inventions in the heyday of Islam to provide an in-depth historical context related to the development of modern information technology. It is expected to contribute to the understanding of the relationship between Islamic thought and modern information technology, as well as stimulate further discussion and research in this field.