cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Journal
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Education,
JAKSTIK jurnal adalah kumpulan jurnal penelitian dari semua fakultas yang ditulis oleh dosen dan mahasiswa STMIK Jakarta. Kami jurnal yang diterbitkan setiap 6 bulan yang menunjukkan jurnal Studi yang berbeda Program studi.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 3, No 2 (2004): Journal" : 8 Documents clear
SYSTEM SECURITY SYSTEM USING ROOM TYPE CARDLOCK AL5H Elly Agustina Julisawati
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the flexibility of key electrical current, the current key system can be combined withhotel management system, so the hotel can easily modify the model code generation cardlockcombination. With the above considerations, the authors tried to simplify the front office or athotels and apartment buildings to make the process of "Room Security System usingCardlock System Type AL5H"
IMPLEMENTATION OF SECURITY IN DYNAMIC BINARY TRANSLATION Hariyanto Hariyanto Hariyanto
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computers at this time is not an expensive item that only owned by a group of people, but itis a tool that can help in completing one's work. It is worth a secure and protect their datafrom data-interference and virus attacks coming from inside and outside the system. At theend of computer security will play an important role in data security.A dynamic binary translation is a dynamic system in the machine code fragment damage thatmay directly or enclosed diesekusi interpreter software. When mengesekusi interpreters, thestatistics are collected to determine how often these fragments diesekusi and how often takenbranches. Fragments of the most frequently used and transformed in the cache for subsequentexecution. Once the fragment is in the cache, they may be merged with other fragments whenthey were found separately by direction of an unconditional branch. This architecture is usedfor optimizing the dynamic programs, instruments and translational arsitetur intropeksi
In order to access WAP SITE DEVELOPMENT ON-LINE LIBRARY CATALOG Maria Maria Ulfa
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Library is one library in terms of a fairly complete collection of books, magazines, VCD, andcassette which is supported also by accessing the service catalog via the Internet. However,not all library users can access them by because they do not have personal internet access, aswell as for those who are mobile. For that, they need the service WAP (Wireless ApplicationProtocol) to make information access library catalogs, more practical and easier, but still ableto provide important information needed in the form of a book title, author name, book status,no.panggil books and no. parent books as well as the location where and how the book wason the floor, in accordance with the existing data in a database. Results from Catalog AccessLibrary Services Development using WAP is, capable of carrying out the process of findingbooks and ordering books for every book that was borrowed, so that during this process isstill done manually, can be done faster and more practical.
APPLICATION PROGRAMMING LANGUAGE C SEARCH FOR ERRORS RELATIVE VALUE AND LITERATURE IN practicum MATHEMATICAL pendulum CASE STUDY: BASIC PHYSICS LABORATORY STMIK JAKARTA STI&K Melani Dewi Lusita
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This writing describes how to find the value of relative error and the literature on experimentsconducted by the lab in the Laboratory of Basic Physics with Mathematical pendulummodule. The need for accurate data is needed. In the case of a mathematical pendulum labwork, data processing will be computerized using C language.
USE AS AN ANTENNA cans amplifier BASED IN COMPUTER NETWORK ACCESS POINT Nenny Anggraini Anggraini
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Writing is about the use of tin as the antenna amplifier in a network without cables based onthe access point. Limited funds to implement a network, either wired or wireless antennasusing a major factor in the use of tin as a wireless antenna that can strengthen the wave fromthe receiving antenna (receiver) to the access point.Counting cans that will become an antenna to it that can not be ignored in order to obtain agood signal amplification.
BASIC DESIGN OF OUTPUT WITH MEDIATOR programmable PERIPHERAL INTERFACE USING LANGUAGE C 8255 Okti Nur Yudhanti Kusumaningtyas
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Series of "Basic Design of Intermediary Output With Programmable Pheriferal 8255Interface Using C Language", is a circuit which is composed of a PC, Interface 8255, and aseries of Basic Output modules that are interconnected with one another. In 8255 PPI servesto bridge between the computer with the Basic Output circuit. This circuit is useful fordisplaying the output in the form on the LED display.
SATISFACTION FACTORS INFLUENCE ON THE PERFORMANCE OF EMPLOYEES WORKING CASSAVA PROCESSING COMPANY Sukirman Sukirman Sukirman
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to determine the influence of factors affecting the level of job satisfaction asindependent variables are salary, kepemimpinandan attitude of co-workers to employeeperformance as the dependent variable. Kerterkaitan extent between independent variableswith dependent variable and significant or not from the day of testing of existing samples.From the test it was apparent factor of job satisfaction, pay, leadership and attitudes of peershas significant influence and positive impact on employee performance. Attitude is a factorco-workers who have the most dominant influence of other variables disbanding, co-workersattitudes can be explained variation in the performance of employees amounted to 99.5%while the remaining 0.5% is explained by other factors of job satisfaction.
DETECTING trojan virus, PREVENTION STEPS TO YOUR COMPUTER SYSTEM Handling Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Trojan Horse or better known as the "Trojan" in the computer system is part of a digitalinfection whose presence is not expected by the owner of the computer. Trojan consisting offunctions of unknown purpose, but the outline has destructive properties. Trojans go into acomputer over a network is inserted at the time by surfing with physical media.Trojans do not take effect directly as well as computer viruses, but the potential hazards canbe far greater than computer viruses. Trojans can be activated and controlled by remote orusing the timer. Remote control as well as the Remote Administration Tools, which is theserver version will be controlled by the attacker through his version of the client. Many thingscan be done by an attacker if the victim's computer that has been controlled. Certain unusualports open trojan indicate active eventsHandling Trojan can be done in two ways, namely prevention (preventive) and treatment(recovery). Prevention efforts conducted prior to the occurrence of infection, namely effortsto keep the system has no security holes. Treatment of business conducted after the system isinfected, the effort to close security holes that have been exploited and eliminate the cause ofinfection.Understanding of the nitty gritty of Trojans need to be known by Internet users to avoid orminimize attacks against him and be able to perform the treatment if infected.

Page 1 of 1 | Total Record : 8