scholarly journals ANALISIS BAHASA PEMROGRAMAN KOMPUTER C++ DALAM SISTEM INFORMASI MANAJEMEN

2022 ◽  
Author(s):  
Akmal Fakhlevi
Keyword(s):  

Artikel ini merupakan hasil pembelajaran bahasa pemrograman C++. Artikel pembelejaran ini adalah artikel yang diandalkan untuk membantu pembaca dalam memahami ide dan isi dalam bahasa pemrograman C++. Artikel ini dapat dimanfaatkan menjadi pilihan unutk belajar mandiri bagi pembaca. Materi yang dibahas dalam artikel ini adalah latar belakang sejarah pembuatan C++,Pengertian C++,Defenisi dari C++, struktur program, komponen-komponen penting pemrograman dalam bahasa C++. Artikel pembelajaran ini dibuat dengan cara prototyping worldview dengan perangkat pendukung seperti Adobe Streak CS3, Microsoft Word 2010, Adobe Photosop CS3. Produk akhir dari kemajuan Artikel ini adalah sebuag disc cerdas, yang target pembacanya adalah mahasiswa yang ingin menguasai Bahasa Pemrograman C++.

2020 ◽  
pp. 32-41
Author(s):  
V. P. Zudin

The article presents new, more accurate algorithms and formulas for calculating the area of a circle, volume of a ball, surface area of a ball. To prove these algorithms and formulas and their practical application, programs have been developed in the Visual Basic for Application in Microsoft Word. These algorithms and formulas should be studied and applied in all educational institutions, as they are closer to the truth. From a more accurate calculation using these formulas, you can get an economic effect when calculating trajectories of movements in space, on the surface of the globe, in the construction and maintenance of products in the form of a circle or a ball. The study of this material in informatics lessons contributes to the development of students' creative thinking, increasing their motivation to study informatics and IT.


2019 ◽  
Vol 11 (1) ◽  
pp. 8-19
Author(s):  
Crystal Jelita Lumban Tobing

 KPPN Medan II is one of the government organization units at the Ministry of Finance. Where leaders and employees who work at KPPN Medan II always carry out official trips between cities and outside the city. With these conditions, making SPPD documents experiencing the intensity of official travel activities carried out by employees of KPPN Medan II can be said frequently. So that in making SPPD in KPPN Medan II is still using the manual method that is recording through Microsoft Word which in the sense is less effective and efficient. In naming employees who get official assignments, officers manually entering employee data that receives official travel letters are prone to being lost because data is manually written. The web-based SPPD application is built by applying this prototyping method which is expected to facilitate SPPD KPPN Medan II management officers in making SPPD that is effective, efficient, accurate, time-saving, and not prone to losing SPPD data of KPPN Medan II employees who will has made official trips due to the existence of a special database to accommodate all SPPD files.


2014 ◽  
Vol 10 (3) ◽  
pp. 201-211
Author(s):  
Morten Pilegaard ◽  
Hanne Berg Ravn

Regional research ethics committee (REC) members have voiced a need for the linguistic improvement of informed consent documents to ensure duly informed consent and to ease committee deliberation. We have little knowledge of what elements of language use hamper comprehension, or of the extent of medical researchers’ appreciation of this problem and their willingness to accept intervention. This qualitative, explorative study proposes an intervention design and tests its feasibility and acceptability. Semi-structured interviews with potential REC applicants informed a linguistic intervention benchmarked against existing guidelines, mandated locally and nationally, and then evaluated quantitatively in a semi-controlled set-up and qualitatively via questionnaires. Potential applicants professed the psychological acceptability of linguistic intervention. The intervention comprised a downloadable Microsoft Word template outlining information structure, a detailed guideline offering advice for each move and self-selected linguistic screening. It was used by 14 applicants and had a measurable effect on REC deliberation time and approval rates. The intervention instruments overall made it easier for applicants to produce informed consent documents meeting prescribed ethical standards concerning lay-friendliness. In conclusion, it was found that linguistic intervention is relevant, feasible and psychologically acceptable to REC applicants; it aids their text production process and seems to enhance the lay-friendliness of these texts.


2020 ◽  
Author(s):  
Hanny Puput Eliyarista Saragih

Perangkat lunak (software) adalah istilah khusus untuk data yang diformat, dan disimpan secara digital. Perangkat lunak tersusun atas program yang menentukan apa yang harus dilakukan oleh komputer. Komputer harus melaksanakan instruksi yang terdapat dalam program untuk mendapatkan hasil yang berguna. Ada dua macam perangkat lunak yaitu sistem software dan application software. Sistem software berguna untuk mengatur file, me-load dan mengeksekusi program serta menerima perintah dari mouse atau keyboard. Sistem software biasa disebut dengan sistem operasi (operating system). Sedang application software adalah software yang digunakan untuk menyelesaikan suatu pekerjaan. Contoh application software adalah Microsoft Word, Microsoft Excel.


2020 ◽  
Author(s):  
Hanny Puput Eliyarista Saragih

Perangkat lunak (software) adalah istilah khusus untuk data yang diformat, dan disimpan secara digital. Perangkat lunak tersusun atas program yang menentukan apa yang harus dilakukan oleh komputer. Komputer harus melaksanakan instruksi yang terdapat dalam program untuk mendapatkan hasil yang berguna. Ada dua macam perangkat lunak yaitu sistem software dan application software. Sistem software berguna untuk mengatur file, me-load dan mengeksekusi program serta menerima perintah dari mouse atau keyboard. Sistem software biasa disebut dengan sistem operasi (operating system). Sedang application software adalah software yang digunakan untuk menyelesaikan suatu pekerjaan. Contoh application software adalah Microsoft Word, Microsoft Excel


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


2018 ◽  
Vol 2 (2) ◽  
pp. 46-54
Author(s):  
Reza Alamsyah ◽  
Mhd. Dicky Syahputra Lubis

Dokumen-dokumen digital dihasilkan dengan menggunakan aplikasi-aplikasi pengolah kata seperti Microsoft Word atau Notepad menjadi sebuah file dengan ekstensi yang berbeda sesuai dengan aplikasi pengolah kata yang digunakan. Seperti halnya dokumen yang bersifat manual, dokumen-dokumen digital ini tidak terlepas dari bahaya kerusakan. Salah satu kerusakan yang sering terjadi pada dokumen digital adalah perubahan yang terjadi didalam dokumen tersebut akibat dari serangan virus atau pemadaman komputer dengan paksa. CRC32 (Cyclic Redundancy Check 32 Bit) merupakan suatu metode yang menggunakan fungsi hash dalam membaca sebuah struktur dalam sebuah file dalam transmisi atau penyimpanan sebuah data. CRC32 dapat digunakan untuk mendeteksi error (kerusakan) pada sebuah data yang mungkin terjadi pada saat transmisi data atau pengiriman data. Perangkat lunak yang dirancang mampu mendeteksi apakah suatu file mengalami perubahan atau kerusakan berdasarkan nilai checksum dan nilai CRC dari file tersebut. Perangkat lunak ini memiliki kelemahan dalam hal proses pendeteksian kerusakan file, dimana perangkat lunak tidak dapat mendeteksi lebih dari satu file sekaligus dalam satu proses pendeteksian. Kata kunci: CRC32, File, Word


2020 ◽  
Vol 35 (172) ◽  
pp. 548-552
Author(s):  
Arthur Author ◽  
Maria J. Author ◽  
S. Author
Keyword(s):  

2021 ◽  
Vol 36 (173) ◽  
pp. 48-52
Author(s):  
Arthur Author ◽  
Maria J. Author ◽  
S. Author
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document