scholarly journals SYSTEM APLIKASI PENANGANAN MASALAH LABORATORIUM PERGURUAN TINGGI RAHARJA

2019 ◽  
Vol 5 (1) ◽  
pp. 35-42
Author(s):  
Fredy Susanto ◽  
Tito Herdiansah ◽  
Muhammad Romadhon

Quite a few computer users who lack sufficient knowledge of handling hardware damage result in a computer or an institution that spends no small amount of money just to repair damage to computer hardware. Therefore the application of the damage monitoring system on the RaharjaCollege Lab computer was made to help monitor computer users in detecting damage to computer hardware along with solutions to deal with the damage. With the problem of damage to the computer Lab at Raharja College, each Laboratory consists of 5 laboratories each Laboratory computer, each class has 30 computers and a total of 150 computers. The current system is still using a manual inspection system using media laboratory computer damage checklist. Therefore, in improving maintenance services in the Lab, an application system should be developed that supports the accuracy and accuracy of the maintenance lab so that it can assist technicians in monitoring the lab, both software and hardware.

2020 ◽  
Author(s):  
Adinda Ayu Fadhilah

Perangkat lunak komputer merupakan sebuah program komputer yang menjembatani pengguna komputer dan perangkat keras yang digunakannya. Dengan kata lain perangkat lunak merupakan penerjemah antara manusia sebagai orang yang memberi instruksi dan komputer sebagai pihak yang menerima instruksi. Perangkat lunak memang tidak tampak secara fisik dan tidak berwujud benda namun bisa untuk dioperasikan. Perangkat lunak secara garis besar software atau perangkat lunak dapat diklasifikasikan menjadi tiga bagian yaitu, perangkat lunak sistem operasi, perangkat lunak sistem aplikasi dan bahasa pemograman.Kata kunci : Perangkat Lunak KomputerAbstractComputer software is a computer program that bridges computer users and the hardware they use. In other words software is a translator between humans as the person who gives instructions and the computer as the party who receives instructions. The software does not appear physically and is not tangible but can be operated. Software outline software or software can be classified into three parts, namely, operating system software, application system software and programming languages.


2020 ◽  
Author(s):  
Nadila Putri Ayu

Perangkat Lunak merupakan salah satu perangkat yang dibutuhkan dalam menjalankan komputer. Perangkat lunak adalah perangkat yang tidak dapat dilihat dan disentuh secara langsung, namun dapat dioperasikan oleh user atau penggunanya. Perangkat lunak komputer (software) merupakan sekumpulan data elektronik yang disimpan dan diatur oleh komputer, data elektronik yang disimpan oleh komputer itu dapat berupa program atau instruksi yang akan menjalankan suatu perintah. Perangkat lunak disebut juga sebagai penerjemah perintah-perintah yang dijalankan pengguna komputer untuk diteruskan atau diproses oleh perangkat keras. Melalui software atau perangkat lunak inilah suatu komputer dapat menjalankan suatu perintah. Secara garis besar software atau perangkat lunak dapat diklasifikasikan menjadi tiga bagian yaitu, perangkat lunak sistem operasi, perangkat lunak sistem aplikasi dan bahasa pemograman.Kata Kunci : Perangkat Lunak AbstractComputer software is one of the devices needed to run a computer. Software is a device that cannot be seen and touched directly, but can be done by the user or the user. Computer software (software) is a collection of electronic data collected and compiled by a computer, electronic data stored by a computer may consist of programs or directions that will execute an order. Software is also referred to as a translator of commands run by computer users to be forwarded or processed by the hardware. It is through this software or software that a computer can run a request. Broadly speaking, software or software can be divided into three parts, namely, operating system software, application system software and programming languages.Keywords: Computer software


2020 ◽  
Author(s):  
Putraangga

Perangkat lunak komputer merupakan sebuah program komputer yang menjembatani pengguna komputer dan perangkat keras yang digunakannya. Dengan kata lain perangkat lunak merupakan penerjemah antara manusia sebagai orang yang memberi instruksi dan komputer sebagai pihak yang menerima instruksi. Perangkat lunak memang tidak tampak secara fisik dan tidak berwujud benda namun  bisa untuk dioperasikan. Perangkat lunak secara garis besar software atau perangkat lunak dapat diklasifikasikan menjadi tiga bagian yaitu, perangkat lunak sistem operasi, perangkat lunak sistem aplikasi dan bahasa pemograman.Computer software is a computer program that bridges computer users and the hardware they use. In other words software is a translator between humans as the person who gives instructions and the computer as the party who receives instructions. The software does not appear physically and is not tangible but can be operated. Software outline software or software can be classified into three parts, namely, operating system software, application system software and programming languages.


2020 ◽  
Author(s):  
Adinda Ayu Fadhilah

Perangkat lunak komputer merupakan sebuah program komputer yang menjembatani pengguna komputer dan perangkat keras yang digunakannya. Dengan kata lain perangkat lunak merupakan penerjemah antara manusia sebagai orang yang memberi instruksi dan komputer sebagai pihak yang menerima instruksi. Perangkat lunak memang tidak tampak secara fisik dan tidak berwujud benda namun bisa untuk dioperasikan. Perangkat lunak secara garis besar software atau perangkat lunak dapat diklasifikasikan menjadi tiga bagian yaitu, perangkat lunak sistem operasi, perangkat lunak sistem aplikasi dan bahasa pemograman.Kata kunci : Perangkat Lunak KomputerAbstractComputer software is a computer program that bridges computer users and the hardware they use. In other words software is a translator between humans as the person who gives instructions and the computer as the party who receives instructions. The software does not appear physically and is not tangible but can be operated. Software outline software or software can be classified into three parts, namely, operating system software, application system software and programming languages.. Keywords: Computer Software


2020 ◽  
Vol 8 (6) ◽  
pp. 5061-5063

Inspection on the dyed material in the textile industry is facing a challenging task owing to the accurate measurement of the dye concentration added. Currently manual inspection is done. It consumes more time and less accurate. The proposed work provides a solution to above problem. The image of reference material (cloth) is captured and the features are extracted using image processing techniques. The color concentration of both the reference material and the test fabric is compared. If the dye concentration of the test fabric matches with the reference material, then it is a perfect dyed cloth whereas for mismatched samples, the concentration is to be adjusted is displayed. This smart dyeing inspection system reduces the manual operation and saves time and results in high accuracy.


Author(s):  
Fitri Ayu ◽  
Dwi Sapta Aryatiningsih ◽  
Ambiyar . ◽  
Fahmi Rizal ◽  
Anita Febriani

In this study, an expert system is used to detect symptoms of damage to computer hardware. With the application of certainty factor models, it is expected to be able to detect symptoms of damage to computer hardware starting with the symptoms of damage from the computer along with solutions for handling the damage. This study aims to produce a fault diagnosis application on web-based computer hardware. This application is expected to make it easier for users to find solutions regarding experienced hardware problems. This expert system application is made using the certainty factor method so that the resulting diagnosis will display symptoms that have more certainty factors. This application was designed using UML and the PHP programming language with black-box testing. The study was conducted by collecting data through literature study, browsing, and interviews. The research method used is the waterfall method. The time of the research is from September 2019 to February 2020. This research is in an application to diagnose damage to computer hardware. Computer Hardware Damage Detection Application can be a guide for computer users in overcoming the damage to hardware with certainty factor methods and can help users in caring for computer hardware so it is not easily damaged.


Author(s):  
Scott M. Bland ◽  
Shiv P. Joshi

This paper discusses the development and testing of an automated robotic ultrasonic guided wave based inspection system developed to provide an efficient, accurate and reliable method for performing nondestructive evaluation and longer term structural health monitoring in advanced composite structures. The development process and challenges in the design of the automated robotic system are described. A number of tests were performed using the developed robotic ultrasonic inspection system on composite honeycomb core sandwich materials. Experiments showed that the developed automated ultrasonic guided wave inspection system was successful at locating disbonds between the core and the facesheets. Environmental sensitivity testing was also performed to characterize the effect of changing temperature and humidity on system performance. These tests indicate that approach was relatively insensitive to environmental changes, so that this approach could be used in service environment without a significant reduction in performance. Current system testing indicates that the described robotic ultrasonic inspection approach offers an accurate and robust method for inspection and long term tracking of advanced structural system health.


Author(s):  
Li Chao

In this case study, you will encounter some of the issues of lab development for delivering lab-based information systems courses online. Many small campuses have very limited budget or no budget at all for the computer lab specifically designed for information systems majors. Sometimes, even with new computers purchased, very few people know how to set them up for lab-based information systems (IS) courses. What are the software and hardware requirements for getting the lab online? How much will it cost? Where can you find resources for the lab development? To ensure quality teaching on IS-related topics, you have to deal with these issues. This case study will discuss how to create a lab that allows students to get hands-on practice for courses such as network management or database processing online with a shoestring budget.


2008 ◽  
pp. 1690-1707
Author(s):  
Kregg Aytes ◽  
Terry Connolly

Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing passwords, continue to engage in unsafe computing practices? In this article we propose a conceptual model of this behavior as the outcome of a boundedly-rational choice process. We explore this model in a survey of undergraduate students (N = 167) at two large public universities. We asked about the frequency with which they engaged in five commonplace but unsafe computing practices, and probed their decision processes with regard to these practices. Although our respondents saw themselves as knowledgeable, competent users, and were broadly aware that serious consequences were quite likely to result, they reported frequent unsafe computing behaviors. We discuss the implications of these findings both for further research on risky computing practices and for training and enforcement policies that will be needed in the organizations these students will shortly be entering.


2008 ◽  
pp. 3866-3886
Author(s):  
Kregg Aytes

Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing passwords, continue to engage in unsafe computing practices? In this chapter we propose a conceptual model of this behavior as the outcome of a boundedly rational choice process. We explore this model in a survey of undergraduate students (N = 167) at two large public universities. We asked about the frequency with which they engaged in five commonplace but unsafe computing practices, and probed their decision processes with regard to these practices. Although our respondents saw themselves as knowledgeable, competent users and were broadly aware that serious consequences were quite likely to result, they reported frequent unsafe computing behaviors. We discuss the implications of these findings both for further research on risky computing practices and for training and enforcement policies that will be needed in the organizations that these students will be entering shortly.


Sign in / Sign up

Export Citation Format

Share Document