Claim Missing Document
Check
Articles

Found 4 Documents
Search

IMPLEMENTASI METODE PROYOTYPING DAN TWITTER BOOTSTRAP RESPONSIVE PADA SISTEM PEMBELAJARAN BAGI SISWA/I SMA DI PALEMBANG Yayuk Ike Meilani
Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer Vol 10, No 2 (2019): JURNAL SIMETRIS VOLUME 10 NO 2 TAHUN 2019
Publisher : Universitas Muria Kudus

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (963.455 KB) | DOI: 10.24176/simet.v10i2.3685

Abstract

Sistem pembelajaran adalah media yang digunakan oleh pihak-pihat terkait yang tidak dapat dipisahkan antara satu sama lain karena saling mendukung yang dapat menunjang dalam proses pembelajaran. Pihak yang terkait dalam proses pembelajaran adalah guru, siswa dan sarana dan prasarana. Beberapa sekolah  masih  menerapkan sistem pembelajaran yang  konvensional yaitu setiap  pelajaran dimulai siswa diwajibkan meminjam buku keperpustakaan untuk dapat mengikuti pelajaran karena bahan ajar yang digunakan guru bersumber dari buku yang ada diperpustakaan. Hal ini membuat proses belajar dan mengajar lebih singkat karena terpotong dengan waktu yang digunakan siswa dalam melakukan peminjaman buku. Selain waktu yang terpotong, juga membuat kerusakan pada buku yang disebabkan oleh keteledoran siswa dalam menggunakan buku pinjaman. Tujuan penelitian ini mempermudah guru dan siswa dalam proses belajar mengajar, memperkecil resiko kerusakan buku yang disebabkan keteledoran siswa sehingga dapat mengurangi anggaran sekolah untuk membeli buku yang anggaran tersebut dapat dialihkan untuk keperluan lainnya. Metode yang digunakan dalam penelitian ini adalah metode prototyping yaitu model trow-away prototyping. Hasil pengujian sistem yang dilakukan pada sistem pembelajaran ini menggunakan blackbox testing yang dimana metode ini menunjukan bahwa sistem yang dibangun berjalan sesuai dengan yang diharapkan.
ASSESSMENT RESIKO TEKNOLOGI PADA IMPLEMENTASI SISTEM INFORMASI AKADEMIK E-UNIVERSITY Yayuk Ike Meilani; Dedy Syamsuar; Yesi Novaria Kunang
Jurnal Bina Komputer Vol 1 No 1 (2019): Jurnal Bina Komputer
Publisher : Jurnal Ilmiah Terpadu Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (331.395 KB) | DOI: 10.33557/binakomputer.v1i1.154

Abstract

Information technology has become an essential part of human life so as to facilitate a business activity. However, the use of information technology is not separated from the risks that can affect the process of the activity. As for the purpose of this study was to conduct an assessment of risk against potential vulnerabilities and threats that can attack the academic information system E-University all at once mempersiapan action anticipation towards things that can interfere with the the system. To do the assessment, this study uses the framework NIST SP 800-30r-1 consisting of nine stages to risk assessment i.e. in the characteristics of the system are used, identify the threats that attack system, identification of vulnerability, control systems, determine the likelihood of occurring (likelihood), determine the impact (impact), the determination of risks, control recommendations and documentation of results. The results of the risk assessment against the academic information system E-University is there are three risks disrupting existing activities in the system. Then from the results of the assessment of risks in the form of recommendations are used to minimize the risks that occur on the system
Aplikasi Inventory Barang Berbasis Website untuk Divisi General Affair dalam Pendataan Barang PT. GED Lintas Indonesia Saputra, Muhammad Hadi; Ike Meilani, Yayuk; Jhonsen Syaftriandi, Muhammad; Effendi, Yanti
MDP Student Conference Vol 3 No 1 (2024): The 3rd MDP Student Conference 2024
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/mdp-sc.v3i1.6992

Abstract

The data collection process still uses a simple method, namely using a paper form to collect stock taking data for all items and using a stock card to collect data on goods. This research aims to create a web-based inventory application that can reduce the risk of errors compared to a manual recording system. The method used is the RAD method. This method is an information system development method that is considered to emphasize short development cycles, so it is considered appropriate to use in developing this system. RAD uses an iterative method in developing a system. The stages that support this method are define the requirements, prototype, receive feedback, and finalize software. The results of this research are a web-based goods inventory application interface that is used to collect goods data and create stock taking reports quickly and accurately.
Object Oriented Programming of Application Admission of New High School Students Yayuk Ike Meilani; Purnama, Jaka
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 1 (2023): Articles Research Volume 7 Issue 1, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i1.12077

Abstract

Abstract: This research was conducted at one of the high schools in Palembang. The admission of new students that are carried out still uses on-site registration so that prospective students must go to school to register. The purpose of implementing object oriented in new student admissions applications is to make the application lighter when using it because the objects are divided into classes. Using the application of oop in application development is useful to make it easier to make applications. The built application can be used for dynamic and flexible new student registration media that can register anywhere and anytime. The concept model used in the application is MVC (Model, View, Controller) which makes it easy for the application to handle errors and bugs due to the structure of the program code used. With the implementation of the oop concept in the program, it is hoped that it can help application development and make it easier to detect errors.