sql server 2000
Recently Published Documents


TOTAL DOCUMENTS

82
(FIVE YEARS 11)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 14 (2) ◽  
pp. 109-116
Author(s):  
Arsito Ari Kuncoro ◽  
Muhamad Zaenudin

Current technology has developed rapidly, computers are one of them. Almost all types of jobs require a computer to complete the task. In the field of computer education it is also very helpful, especially in terms of payroll services for teachers and employees who work as educators. MTs NU Jogoloyo Wonosalam Demak as an institution that has a large number of teachers and employees, besides that every day attendance officers are absent which results in difficulties in making payroll reports, especially recording and reporting still using manual methods so it takes longer time to record and deliver. report. In addition, sometimes there is a misunderstanding between attendance officers and teachers and employees regarding remuneration at the end of the month. In solving this payroll problem, the writer uses the Research and Development (R & D) method, while making applications can use high-level programming languages ​​such as Microsoft Visual Basic Ver 6.0. and SQL Server 2000 for data base management. Payroll applications are needed to simplify transactions and reporting on a monthly basis. With the use of this new payroll system software, it is hoped that it can produce quality information, improve service to employees and can assist in the decision-making process


2021 ◽  
Author(s):  
Vijayakumar R ◽  
Vijay K ◽  
Sivaranjani P ◽  
Priya V

The way of thinking of traffic observing for discovery of system assaults is predicated on a “gained information” viewpoint: current methods recognize either the notable assaults which they’re customized to alarm on, or those strange occasions that veer off from a known typical activity profile. These philosophies depend on an expert structure which gives the ideal data, either with respect to “marks” of the striking attacks or as anomaly free traffic datasets, adequately rich to make delegate profiles for commonplace movement traffic. The theory talks about the limitations of current information-based system to recognize organize assaults in an inexorably unpredictable and advancing Web, Described by ever-rising applications and an ever-expanding number of most recent system assaults. In an oppositely inverse viewpoint, we place the weight on the occasion of solo recognition strategies, fit for distinguishing obscure system assaults during a unique situation with none past information, neither on the attributes of the assault nor on the gauge traffic conduct. In view of the perception that an outsized portion of system assaults are contained during a little division of traffic flows, the proposition exhibits an approach to join basic bunching strategies to precisely distinguish and portray malignant flows. to bring up the practicality of such an information autonomous methodology, a solid multi-bunching-based location technique is created and assess its capacity to recognize and portray arrange assaults with none past information, utilizing bundle follows from two genuine operational systems. The methodology is acclimated identify and describe obscure vindictive flows, and spotlights on the identification and portrayal of ordinary and notable assaults, which encourages the translation of results. When contrasted with the predominant DDoS traceback techniques, the proposed system has assortment of favorable circumstances—it is memory no concentrated, proficiently adaptable, vigorous against parcel contamination, and free of assault traffic designs. The consequences of inside and out test and reenactment considers are introduced to exhibit the adequacy and effectiveness of the proposed strategy. It’s an uncommon test to traceback the wellspring of Circulated Disavowal of-Administration (DDoS) assaults inside the Web. In DDoS assaults, aggressors create a lot of solicitations to casualties through undermined PCs (zombies), with the point of keeping ordinary help or debasing from getting the norm of administrations. Because of this fundamental change, the proposed system conquers the acquired downsides of parcel stamping strategies, similar to weakness to bundle contaminations. The execution of the proposed strategy welcomes no changes on current steering programming. Moreover, this work builds up a hypothetical structure for assessing the insurance of IDS against mimicry assaults. It shows an approach to break the wellbeing of 1 distributed IDS with these strategies, and it tentatively affirms the capacity of various assaults by giving a worked model. The Project is intended by using Java 1.6 as face and MS SQL Server 2000 as backside. The IDE used is Net Beans 6.8.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-10
Author(s):  
Kasih Purwantini ◽  
Vivi Kumalasari

Inventory is a current asset that has a major role in the accounting cycle. Assyfa Farma Pharmacy is the business of an individual-owned dispensary that is developing in Mranggen District, Demak Regency. The problem faced by Assyfa Farma Pharmacy is that there is no minimum stock of goods because there is no warning that the stock will run out. The number of products that are almost entering the expiration date are on shelves and insecure data storage so that they have a very large risk of data being lost because it is stolen by irresponsible parties. This system will alert the user to the remaining stock of existing goods and the expiration date of the goods. The security of inventory processing data will be guaranteed with a password for users so that anyone cannot access the database. This inventory information system will be built with Microsoft Visual Basic 6.0 programming language, Microsoft SQL Server 2000 as database and multi user network using FEFO method as goods storage method.  


2021 ◽  
Vol 4 (1) ◽  
pp. 73
Author(s):  
Ayu Tiara Defi ◽  
Dedi Suhendro

PT Federal Internasional Finance (FIF) Group is a finance company whose majority shareholder is PT Astra. The high routine of PT Federal International Finance (FIF) Group has 39 hours of work a week so that PT Federal International Finance (FIF) Group has enough data to manage. For example regarding fixed asset data. Based on observations made by the author, PT Federal International Finance (FIF) Group computes computerized inventory of office inventory depreciation using Microsoft Excel. In office inventory calculations that have 50 inventory data, data redundancy often occurs, such as entering the same inventory name, often repeating and using inefficient time due to the large amount of inventory data that will be inputted into Microsoft Excel. To overcome this problem the authors designed calculations using the Straight Line Method to overcome the use of inefficient time and to avoid duplicate data. The design created is the context diagram design, the Data Flow Diagram (DFD) design, the Entity Relational Diagram (ERD) design, the Inter Table Design (RAT) design. In building this system a system is used, namely Microsoft Visual Basic 6.0 and SQL Server 2000 Database.


Author(s):  
Koné Forokoro ◽  
Mouneri Maïga ◽  
Mohamed S. Maïga

Since 1992, implement decentralization reformin Mali has made it possible to empower  populations in their own development planning. Resources distribution to local authorities requires detailed information of the constraints and the assets linked to their development. Data collected on  rural area are often poorly defined, redundant or incomplete and inefficiencies for sharing due to a lack of applied standard tools. The information is too descriptive and it is difficult to extract useful one for decision making process. There is inadequate information upon which to base resource allocation decisions. The purpose of this paper is to define data that can be collected on rural municipalities or localities and handled by GIS to make information available for decision-makers, planners and beneficiaries. The data used from Malian poverty survey performed in 2001-2002 focused on the satisfaction of basic household needs. This concept is based on meeting those who lack access to basic living needs, which generally include clean water, sanitation, nutrition, primary health services, and basic education. The method used the platform of "MapGIS IGS, IIS6, Windows Server 2003, ASP.NET and MS SQL Server 2000" to develop an application GIS Web Service. Data are integrated and published as services by the platform. The product output have been tested successfully on the intranet of Wuhan Zondy Cyber in the term of interoperability and extraction of the information needed. With this tool, each local authority can be a potential collector of his own data and participates to update the database. The Web Services model of the GIS systems described provides to users, services and data they need, without having to install, learn, or pay for any unused functionalities. The extension of this standardization in all ECOWAS countries would be a great advantage regarding the sharing of geographic information between countries.


2020 ◽  
Author(s):  
Veronica Sherly Agustina

Belum terdapatnya penilaian kinerja karyawan berbasis kompetensi menyebabkan sumber daya manusia yang dimiliki oleh perusahaan terkadang tidak cukup kompeten untuk jabatan yang dipegangnya. Penyebab utama terjadinya hal tersebut dikarenakan belum diterapkannya suatu metode untuk mengatur pelaksanaan proses penilaian kinerja karyawan berbasis kompetensi yang memiliki suatu standar nilai tertentu. Pada dasarnya inti dari proses penilaian kinerja karyawan adalah melakukan evaluasi atas kinerja karyawan yang bersangkutan. Model kompetensi yang dikembangkan akan sangat berguna untuk memberikan pedoman yang jelas dalam menentukan pelatihan yang dibutuhkan karyawan. Untuk pembobotan kriteria penilaian menggunakan metode Paired Comparison. Dengan mengkombinasikan model kompetensi dan matriks perbandingan berpasangan, maka dapat diketahui kompetensi mana yang paling membutuhkan pelatihan. Sistem informasi penilaian kinerja karyawan berbasis kompetensi akan dapat membantu perusahaan dalam menempatkan sumber daya manusia yang kompeten untuk suatu jabatan tertentu. Sistem informasi ini akan menghasilkan laporan penilaian kinerja secara cepat dengan hasil yang akurat karena bebas dari kesalahan perhitungan dan meminimumkan faktor human error. Sebelum melakukan pemrograman dengan menggunakan software ASP.NET dan Microsoft SQL Server 2000, maka terlebih dulu dilakukan langkah awal yaitu analisis dan perancangan sistem dengan pendekatan berorientasi objek (OOA/D), dimana alat bantu yang digunakan dalam perancangan atau pemodelan secara visual adalah UML diagram, yang akan membantu dan mempermudah dalam pembuatan database dan program.


2019 ◽  
Vol 2 (2) ◽  
pp. 145
Author(s):  
Erikson Damanik

PT. Medan Tropical Canning is a company engaged in the production and export of aquaculture materials and marine catches, such as shrimp, fish, and so on. PT. Medan Tropical Canning manually monitors and maintains production machinery such as calculation of maintenance schedules and replacement of spare parts contained in production machinery. Frequent occurrences of errors in the calculation of maintenance scheduling and replacement of spare parts cause disruption of production activities.To deal with the problem, the authors propose a computerized information system using the STRADIS system development methodology. This information system is a program developed using the Microsoft Visual Basic 2005 programming language, database using Microsoft SQL Server 2000, and Business Objects Crystal Report 10 for report design.With the completion of the developed system, the data inputted will be processed with a database management system so that it can help monitor and maintain production machines and make reports faster and more accurate. The results of this computerized preventive maintenance information system are expected to benefit the company.


The patient service information system at the Gisting Public Health Center, Bahasa: Pusat Kesehatan Masyarakat (Puskesmas), is the development of an existing and computerized drug inventory system. The patient service system existing at the Gisting Public Health Center does not support the recording of data so the data recording is not well organized. The purpose of this study is to create an application and implementation of a multiuser-based patient service information system. This system will provide the result of report and information needed by the patient services administration. It is hoped that this system can be used as an experienced assistant. This application helps in making decisions and operational activities as an effort to achieve the goals to be achieved by the Public Health Center. This application system analyzes the service data at the Gisting Public Health Center. This information system application development used Visual Basic 6.0 programming and for database used SQL Server 2000.


2019 ◽  
Author(s):  
Alessandra Rodrigues Cardoso Padovam ◽  
◽  
Flavio Baggio Pires ◽  
Keyword(s):  

Author(s):  
Ridwan Setiawan ◽  
Hery Dwi Yulianto

PT BPR Metro Asia Mandiri wich is located at Jl. Raya Soekarno-Hatta Bandung, Phone.022-7537668 Fax. 022-7537670. Int the time of executing the recording and calculating the costumer loan transacton, PT BPR Metro Asia Mandiri uses Microsoft Excel.These problems will result uneffective and unoptimal.To reduce these problems, the writer takes the title “Perancangan Sistem Informasi Akuntansi Kredit Konsumtif dengan Menggunakan Software Microsoft Visual Basic 6.0 dan SQL Server 2000 Berbasis Client Server”. As the research design the author uses research design with primary/secondary daya, the author uses qualitative data ande quantitative data, the author uses exploratory ande descriptive research as a research method, for data collection techniques the writer uses field studies consinting of interviews, obsrvation dand literature studies, the author using process, data and output oriented methodologies. The author use the waterfall model as a system design structure. Information system degin use contxt diagrams, data flow diagrams, data dictionaries, flow diagram, normalization and Entity Relationshop Diagrams.


Sign in / Sign up

Export Citation Format

Share Document