scholarly journals PERANCANGAN APLIKASI SISTEM MONITORING JARINGAN REMOTE PC BERBASIS JAVA

Author(s):  
Desep Priandes ◽  
Ahmaddul Hadi ◽  
Dedy Irfan

Utilization of information technology and computer network as data communication media until now increasing. The need for shared use of resources (Resources) that exist in the network both software and hardware has led to the emergence of various development of network technology itself. The bigger a company or institution that use computer network hence more complex also network system at company or agency, and needed a good handling for system can run optimally The purpose of this Final Project is to design and supervise the condition of computer and also Clientr on network And can handle it. The computer network administrator tasked with organizing and manag`ing the local network requires a lot of information, so that the decisions made lead to the best decision in handling the problems on a network. Therefore,management information on a network system will correctly affect the security of the network. After Implementation of Remote Access System Based on the test of software engineering laboratory obtained convenience Port used in the process of remote monitoring computer network on port 6060. So that it can be Implemented by computer users, in the process of Monitoring Remote Network Computer. Keywords : Remote Komputer, Java, Netbeans, Framework,Unified Modelling Language.

2018 ◽  
Vol 2 (1) ◽  
pp. 18-22
Author(s):  
Muhammad Nashrullah ◽  
Muhammad Alif Raher

Utilization of information technology and computer network as data communication media has been increased. The requirement for shared use of existing resources in the network both software and hardware has resulted in the development of various technologies of the network itself. Information technology and communications are widely used today using computer network system as a medium of information and data transformation, the greater the company or agency that uses the network computer the more complex the network system in the company or agency, and required a good handling for the system can run optimally. One of them that uses computer network system is Banyan Tree Bintan. Network monitoring activities in Banyan Tree Bintan are important to do by network administrator to ensure the network is always in good condition. Given the limitations of network administrators who can not always be in the workplace, it is necessary for a system that can monitor the computer network remotely. So that the network administrator can know the state of the computer network at any time and can perform actions that need to be done quickly.This application is based on android using an Internet connection for network administrators can monitor network anytime and anywhere. Desktop-based applications need to be installed on the computer so that computer system data can be retrieved and displayed on android devices.


Author(s):  
Asroji Asroji

This study was conducted based on the facts about the lack of maximal outcomes of learning English in almost all levels of education, especially in vocational school. Although English has been studied for many years, but the majority of students can not master English well, especially speaking. Many factors cause this phenomenon, and all parties should concern to work together to formulatebetter system and process of English learning at vocational school.The research was conducted at SMK Negeri 1 Pacitan, by taking the students of class XII as subjects research. The sample of this research consists of 94 students of Business Travel and Tourism,Network Computer Engineering, and Engineering Software classes. This research uses descriptive qualitative method. It is used to describe the students’ speaking competence, particularlyin presenting final task report. This research also identifies the internal and external functions to formulate a strategy to improve the students’s speaking competence. The results showed that based on the analysis of English speaking competency of SMK Negeri 1 Pacitan students, it can be concluded as follows: a). Based on the students absorption analysis of presenting final project report, shows that English competency level of students is in the category of “pretty”, with evidence of the studentsvalue average in presenting final project report is more than the passing grade value (7.50),it is 79.5. While the number of student, who passed the presentation test,is 66 students.So it can be obtained the percentage level of mastery learning students on the presentation test of final report is only 70.21%, and it is categorized “less”, because the percentage of students who passed this exam is still under 75%. b). While the analysis of the questionnaire can be scribed that the average overall score of 3.44 speaking competence components are categorized “pretty”, and it can be concluded that the level of competence of English speaking students generally categorized “enough”. Based on the level ofstudents’ English speaking competence , it can be formulated the strategies to increase its competence. They are: a). Maximizing the use of English as a language instruction and reducing the use of Indonesian, especially in the learning process, to improve English language competency, so that students can have the ability to explain the sequence of events and the students can pass the exam well. b). Having more English presentation activitiesin other topics to encourage the students’ bravery and self-confidence in speaking English, so that students have good Englishcompetence as preparation to getjobs or to continue their study at university.c). Having more exercise of using body language to improve the mastery of speech, and smooth attitude, so that students have good English competence,and they are able to compete in the global world in obtaining employment. d). And maximizing the use of school’s facilities by using various methods of learning, and focusing on the students’ center method to improve the studentsEnglish competency so that they are able to compete for educational scholarships in this country and abroad.


2018 ◽  
Vol 7 (2.13) ◽  
pp. 341 ◽  
Author(s):  
Janner Simarmata ◽  
Tonni Limbong ◽  
Efendi Napitupulu ◽  
S Sriadhi ◽  
A R S Tambunan ◽  
...  

In conventional learning, teachers frequently face difficulties to deliver their materials due to limited time and practical materials in teaching network computer. Conventional teaching process, especially practical materials, has still not yet been optimal. Thus, computer and multimedia based learning is required to help the students. Besides it can reduce costs in practical materials procurement, the students can absorb the given knowledge well without thinking of the costs to buy the practical materials. Computer Assisted Instruction Method can present the learning using various media either by picture or video that can assist the effective learning process and simplify the students to manage the learning speed since it is combined with the multimedia. By doing this, the students can practice the lesson materials, study whenever and wherever they want. Compuer learning application prioritize user interface, user friendly, which can make the students be diligent and passionate in learning. 


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
K. A. Fedosiva ◽  
◽  
I. M. Sribna

The article is devoted to the analysis of the Ukrainian market for the spread of cloud technologies, an overview of growth dynamics, application segments and identifies leading companies that offer services using cloud computing. According to the unanimous forecasts of the world’s leading consulting companies, the rapid improvement and spread of cloud computing is now one of the key trends that in the next 5-8 years will significantly affect the global development of not only the IT industry but also business, finance, public administration, medicine, education and many other areas of human life. Prospects for the rapid development of cloud services in Ukraine encourage more careful consideration of the experience of their application in more «mature» markets and identify the main benefits and risks of these technologies in local conditions. People perceive the cloud as a platform only for storage and computing. However, there are many other opportunities that cloud technologies offer with cloud computing. Currently, cloud computing technologies are becoming increasingly popular. The advantages of this technology are obvious: economy, speed, elasticity, versatility of access. In the future, their use will create a powerful information and telecommunications system, which will be a technological solution for the construction and development of new infrastructure in the country. The world’s largest IT vendors (Microsoft, Amazon, Google and others) somehow implement cloud computing services, providing a wide range of opportunities for users. Thus, cloud computing is software and hardware that is available to the user via the Internet (or local network) in the form of a service that allows you to use a user-friendly web interface for remote access to dedicated resources (computing resources, programs and data). Thus, cloud computing is the next stage of information development of mankind.


K ta Kita ◽  
2017 ◽  
Vol 5 (1) ◽  
pp. 21-27
Author(s):  
Amelia Abrianti ◽  
Jusuf I Ibrahim

This Business Communication Final Project (BCFP) is made for PT. Aneka Indo Makmur (AIM), one of the biggest biscuits manufacturers in Indonesia. The background of the study is the fact that the company has a hard time getting new partners or distributors. PT. AIM does not have a right promotional tool that can convince the partners to work together with the company. Because of this problem, the company cannot develop the business. Thus, PT. AIM needs a company profile video which not only can give a clearer information about the company, but also can function as a marketing tool for PT. AIM, to promote its unique strengths and attract more partners or distributors. This company profile video contains the company’s history, product description, structure of the company, employee performance, company’s vision and mission statement, company’s working environment, and also rewards that the company has received.


2020 ◽  
Author(s):  
ADITYA WIRAGUNA ◽  
Tisa Seftiananda ◽  
Pandu Pratama Putra M.Kom

Computer network connection is a fundamental thing and is very important in the establishment of internet cafe businesses. LAN network design must also consider the cost budget so that the use of tools can be maximized and not cause losses. If the connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system to be used


Sign in / Sign up

Export Citation Format

Share Document