cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Journal
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Education,
JAKSTIK jurnal adalah kumpulan jurnal penelitian dari semua fakultas yang ditulis oleh dosen dan mahasiswa STMIK Jakarta. Kami jurnal yang diterbitkan setiap 6 bulan yang menunjukkan jurnal Studi yang berbeda Program studi.
Arjuna Subject : -
Articles 64 Documents
BASIC DESIGN OF OUTPUT WITH MEDIATOR programmable PERIPHERAL INTERFACE USING LANGUAGE C 8255 Okti Nur Yudhanti Kusumaningtyas
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Series of "Basic Design of Intermediary Output With Programmable Pheriferal 8255Interface Using C Language", is a circuit which is composed of a PC, Interface 8255, and aseries of Basic Output modules that are interconnected with one another. In 8255 PPI servesto bridge between the computer with the Basic Output circuit. This circuit is useful fordisplaying the output in the form on the LED display.
SATISFACTION FACTORS INFLUENCE ON THE PERFORMANCE OF EMPLOYEES WORKING CASSAVA PROCESSING COMPANY Sukirman Sukirman Sukirman
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to determine the influence of factors affecting the level of job satisfaction asindependent variables are salary, kepemimpinandan attitude of co-workers to employeeperformance as the dependent variable. Kerterkaitan extent between independent variableswith dependent variable and significant or not from the day of testing of existing samples.From the test it was apparent factor of job satisfaction, pay, leadership and attitudes of peershas significant influence and positive impact on employee performance. Attitude is a factorco-workers who have the most dominant influence of other variables disbanding, co-workersattitudes can be explained variation in the performance of employees amounted to 99.5%while the remaining 0.5% is explained by other factors of job satisfaction.
DETECTING trojan virus, PREVENTION STEPS TO YOUR COMPUTER SYSTEM Handling Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Trojan Horse or better known as the "Trojan" in the computer system is part of a digitalinfection whose presence is not expected by the owner of the computer. Trojan consisting offunctions of unknown purpose, but the outline has destructive properties. Trojans go into acomputer over a network is inserted at the time by surfing with physical media.Trojans do not take effect directly as well as computer viruses, but the potential hazards canbe far greater than computer viruses. Trojans can be activated and controlled by remote orusing the timer. Remote control as well as the Remote Administration Tools, which is theserver version will be controlled by the attacker through his version of the client. Many thingscan be done by an attacker if the victim's computer that has been controlled. Certain unusualports open trojan indicate active eventsHandling Trojan can be done in two ways, namely prevention (preventive) and treatment(recovery). Prevention efforts conducted prior to the occurrence of infection, namely effortsto keep the system has no security holes. Treatment of business conducted after the system isinfected, the effort to close security holes that have been exploited and eliminate the cause ofinfection.Understanding of the nitty gritty of Trojans need to be known by Internet users to avoid orminimize attacks against him and be able to perform the treatment if infected.
TERMS DICTIONARY COMPUTER APPLICATIONS USING VISUAL BASIC 6.0 SOFTWARE Diana Desy
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Every field of science have their own terms in the fields of science, as well as a lot ofcomputer science that there are terms in it, generally only those who learn the computer onlyunderstands these terms. To help find out the computer terms, the writer tries to make theApplication Dictionary of Computer Terms with Visual Basic 6.0. Discussion
MOTIVATION MODEL-BASED COMMUNICATION SYSTEM E-LEARNING Eriek Orlando
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ELearning System is a solution that is needed in the era of globalization of education today.The presence of eLearning with the support of information technology to bring the influenceof conventional education in the transformation process into digital form, both in content andsystem. Today eLearning industry is experiencing a crisis, which resulted in the failure of theimplementation of eLearning in various sectors in the world. The failure was mainly due tovery few users and are not motivated to finish until the end of eLearning materials. Writingprovides a solution by developing a model-based eLearning system that can motivate thecommunity to overcome the low motivated users and not users in using the eLearning system.Community motivation model developed based on theories of learning and motivation theorycapturing requirements in the field of requirements engineering. Measurement of theeffectiveness of community motivation model using statistical indicators of visits, trafficranking, comparison with similar eLearning system, and relationships between concepts inthe model. The model developed has also been applied in a public web based eLearningsystem IlmuKomputer.Com, with a significant result.
MAKING APPLICATION DESIGN DIAGRAM plot (flowchart) Hariyanto Hariyanto
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As technology advances and information age, the programming language progress veryrapidly, both in usage and in making program.Programming languages and algorithms necessary if a problem should be solved throughcomputer technology, in order to save time and simplify their use.In general, before a problem solved through a programming language, first the problem wassolved through a flowchart diagram, the tool graphically depiction of the steps and thesequence of procedures of a program. Flowchart to help analysts and programmers to solvethe problem into segments that are smaller and help in analyzing alternatives in the operation.Flowchart usually facilitate the settlement of a problem, especially problems that need to befurther studied and evaluated.
DATA ACQUISITION SYSTEM THROUGH THE INTERNET NETWORK CASE STUDY ROOM TEMPERATURE MEASUREMENT WITH SENSOR DS1621 Indrianto Indrianto
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sensor in industrial and other much needed because with the sensor adannya industrial areascan be easily able to control equipment remotely. The sensor can be used if there is a series ofADC and DAC, and required a calibration for the sensor can measure an exact quantity. Byusing DS1621 sensors then it is not necessary because the DS1621 is a sensor that 'smart'(Intelegent sensor). DS1621 does not require the microcontroller and does not requirecalibration.Temperature Measuring Equipment Design Room With DS1621 Sensor Networks ThroughInternet-Based Personal is a tool for censorship that uses DS1621 temperature. Data sent bythe temperature sensor can be taken via the Internet network so that this equipment can beaccessed from anywhere as long as it is connected to the internet. This circuit has atemperature of 125 C-20 .......+ Software used to display the results of temperaturemeasurement is HTML. Use the Windows 2000 server as a server on this design is veryhelpful. Since making almost all computer activity becomes easier, faster and fully integratewith the Internet because there are DNS (Domain Name System) and IIS (InternetInformation Service).
COMPUTER CRIME Ristyawati Ristyawati
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer crime can be categorized as crimes of "White Colar Crime", which operates inmore use of the mind or brain. Definition of Cyber crime is any act that harm others orcertain parties who performed on digital media or with the aid of digital devices.
BANK HEALTH ANALYSIS BEFORE AND AFTER X RECAPITALIZATION VIEWED FROM EQUITY CAPITAL FACTORS, QUALITY OF PRODUCTIVE ASSETS, PROFITABILITY AND LIQUIDITY Soegijanto Soegijanto
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the deregulation of Banking conducted by the government through June 1, 1983package which gives freedom to banks in determining credit limits provided within itscapabilities and determine the interest rates of deposits and savings. October 27, 1998package provides ease in setting up the opening of the Bank and Branch. From both of thesepackages have an impact on the increasing number of banks (both head office and branches),so the competition to attract funds from the public has increased.Bank Indonesia as a supervisor and coach of the National Banking require control of the bank- a bank it to know the financial condition and operations of each bank. Bank Indonesia, helda regular basis by assessing the supervision standard tehadap bank soundness based oninformation from reports such as balance sheet along with the administrative account, the listof securities held and issued, details of loans, investment details, details of profit and lossstatements and other health lain.Tingkat bank is the interest of all parties involved, both theowner and manager of the bank, community bank service users, as well as Bank Indonesia asthe National Banking supervisors and coaches.Bank health assessment can be done with qualitative and quantitative approach to calculationof the most influential aspect of the condition and development of a bank that includesassessment of the capital factor (capital), quality of productive assets (assets), management(managerial), profitability (Earning Power) , liquidity (Liquidity), commonly called CAMEL,which can be determined from the results of the assessment of health of a bank predicate.For banks that get a bad title, but can meet the requirements specified by the Governmentmay be included daam Recapitalization programs, thus increasing the value of its CapitalAdequacy Ratio.
ACCOUNTING STUDENTS PERCEPTION OF ETHICS PREPARATION TO THE FINANCIAL STATEMENTS Sukirman Sukirman
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to examine differences in perceptions of accounting students to ethicalfinancial statements, among students who already take a course in ethics education tostudents who have not take a course in ethics education. Analysis based on data from 134respondents via the research collection used by researchers kuesioner.Metode Mann Whitneytest was used to examine differences in perceptions of students towards the preparation offinancial reports and test students' responsibility over financial reporting, whereas the T-TestTest used to test differences in perception between men and wanita.Hasil research shows thatthere are significant differences between students who have taken ethics education to studentswho have not taken ethics education. Students who have taken ethics education has a goodperception of the ethical preparation of financial statements compared with students whohave not taken ethics education. As for responsibility in reporting of financial information ofstudents who have not taken ethics education are higher than the students who have not takenethics education. This means that the accounting curriculum at universities is considered notenough to give stock ethics to the students to plunge into the world of work.