cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Information System
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Jurnal Sistem Informasi terdiri dari penelitian dan publikasi ilmiah dari Sistem Informasi, STMIK Jakarta.
Arjuna Subject : -
Articles 1,345 Documents
ADMINISTRATIVE INFORMATION SYSTEMS DESIGN BEAUTIFUL RESTAURANT TOUR Risman Risman; Drs. Soetirto Sadikin. M.A
Jurnal Sistem Informasi 1999
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Satisfactory service is the key to business done wonderful tourist restaurants. One ofthe restaurant management efforts to meet these demands is to build informationsystems that can handle sales, handling of inventory until the purchase of rawmaterials, so the restaurant will be increasing productivity.To meet these needs, the author conducted the analysis and design of administrativeinformation system that handles its restaurant sales, purchasing, accounts payable andinventory handling. The research which writer to do is to read books and otherreading as a source of information. Moreover, I also do research directly to the fieldin a way mewancarai the parties involved to get their feedback about restaurant workprocedures.The result is known that the administration system of integrated computer-basedrestaurant can meet the needs of beautiful tourist restaurant management.
CONFIGURATION SOFTWARE FOR PACKET RADIO DATA COMMUNICATION Vincentsius Surya; Dra. Hj. Latifah. MM Dra. Hj. Latifah. MM
Jurnal Sistem Informasi 1997
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the normal course of communication, the NOS system may communicate withpacket data communication system of another. This is because all systemscommunicating using the protocol AX.25 (Amateur X.25), which is a variant of X.25,shown for packet radio communications.Communication has not been so perfectly executed. There are still many problemsthat arise. This is because communication is carried out using HT communication toolthat has little power. Besides having a lot of interference, the communication can notreach remote areas to get a wave of other radio BBS server.
PAYMENT SYSTEMS APPLICATIONS COURSE IN ENGLISH COURSE INSTITUTION IEC Zul Ferizal Hermin; Eko Hadiyanto,SSi, MM
Jurnal Sistem Informasi 1997
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With this application programs or the work of administrative tasks will be furtherfacilitated. Because the administration can simply enter data about students andcomputers that will manage it, so to minimize the possibility of the things we do notwant, such as loss of data due to scattered and so on, besides it can save time, effortand money.
PROCEDURE OF ANALYSIS SERVICE DATABASE SYSTEM TIME COMPUTER NETWORK BASED ON ONLINE BANKING Hikmayanti Hikmayanti; Latifah. Dra. MM Latifah. Dra. MM
Jurnal Sistem Informasi 1998
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A bank to serve customers primarily in deposit services require an online computernetwork.In this case the deposit is still using a stand alone computer that is online, therefore,used an online computer network and then analyze how the way the proceduredatabase system of computer network-based deposit service online. Another obstaclethat may arise such as the use of human resources who lack expertise and technologythat are no longer able to compete in speed and accuracy of information generated.
WAKE UP ONLINE WEBSITE DESIGN POLL Edy Ruslan; Eko Hardiyanto. SSi. MMSi
Jurnal Sistem Informasi 2001
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This website application online poll will be very useful for collecting activity data.By using this website online poll, can overcome the constraints faced in the pollsduring this manual.Website this poll is very easy to use by the system administrator or the provider of thewebsite because it has administrative functions via the admin panel in charge ofchanging and adding a poll question.
HACKING MACROS VIRUS USING OPEN SOURCE Hari Suryantoro; Irwan Bastian. Skom. MMSi
Jurnal Sistem Informasi 2001
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In general this paper aims to provide knowledge to computer users, especially usersof Microsoft Word application program, about Macro viruses (viruses that infect filedocuments). In this writing, the author tries to explain all the things about macroviruses, from the manufa cturing process of various versions of Macro virus, macromacrosused by macro viruses, Macro viruses in protecting themselves, the evils ofmacro viruses that can harm a computer user data , how to detect the presence ofvirus in a dukomen Macro and open source code viruses. Protection facilities inMicrosoft Word, the macro virus treatment and prevention must become a userwithout anti- virus, and viruses in a simple Macro.
PREDICT THE NUMBER OF NEW STUDENTS IN THE ACCEPTANCE STMIK JAKARTA (STI&K) BY COMPARING THE INDUCTIVE STATISTICAL USING SEMI AVERAGE METHOD AND METHOD LEAST SQUARES Johan Sharif; Aqwam Rosadi Kardian. Skom. MM
Jurnal Sistem Informasi 2002
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Based on the presumption that the new reception at STMIK Jakarta experienced adecline, then the author tries to analyze and admissions data megkaji STMIK Jakarta,to prove the allegation. The author also tries to predict the number of admissions ofnew students next year, as consideration for the conductor STMIK Jakarta (STI & K)to take steps that in the future. The writing method used by the writer is literaturestudy method and interview method. The conclusion is indeed true number ofadmissions STMIK Jakarta (STI & K) has decreased.
SHOPPING LIST APPLICATION PROGRAM WITH TURBO PASCAL 7.0 Ruli Rahmadi; IRE Puspa Wardani, SKom, MMSI
Jurnal Sistem Informasi 2000
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The application program is a program created for a particular data processing system.Flowchart is a chart that describes in detail the steps of the process of the program.Computer programming language Turbo Pascal is a high-level language whoseorientation in all fields. Pascal has control structures, namely the ability to dorepetition pascal language, choosing an action or branching in an action.There are several ways you can do to reduce the number of inputs that will beinserted into a computer without compromising completeness. These ways is the firstby using the code. Use the code will make inputs into shorter and unique. Both arerelatively constant data stored in the master file reference. Third time and date and thefourth was taken from the computer calculations performed by a computer routine.
PROCESSOR SCHEDULING TECHNIQUES IN COMPUTER OPERATING SYSTEM Susi Arlita Anggraeni; Susi Wagiyati P, SKom, MM
Jurnal Sistem Informasi 1999
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The main task of an operating system is to monitor and oversee all developmentactivities in the process of the operating system dynamically track the status of theprocess changes that occur in the system overall. All the activities that occurred in theoperating system, such occur in the processor in carrying out its activities, the needfor a rescheduling. Thus, by the implementation of all processes can be served fairly.The operating system is known, several techniques for scheduling. Differencesbetween each scheduling technique lies in the process of coming to the screening.And each has a characteristic penjaualan techniques, goals, and unique applications.
APPLICATION FOR SECURITY ENCRYPTION TECHNIQUES DATA ON E-MAIL Darwito Darwito; Sahni Damerianta P. Skom. MM
Jurnal Sistem Informasi 2000
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The need for information is increasing, along with the development of computertechnology which require data as input and produces an output in the form ofinformation, which can be used for certain purposes. With the increasingdevelopment of computer technology, we are more easily obtain the desiredinformation and faster. Confidential information requiring special handling, both ingetting that information from the source of information, during the journey to theplace recipient information, or when information is received. Thus, if there is aconfidential news and apparently there are certain parties who deliberately orinadvertently read the electronic mail we receive, we will suffer losses. To overcomethis a most unusual way is to protect such data through password protection at thetime of access. But if just using a password that data can still be accessed through theaccess way is not through the standard application. Therefore one of the best ways isto encode or scramble the information contained in these data based on a pattern or acertain key, which can only be read back to the real meaning by the parties entitled.