Learning activities at the Creative Media State Polytechnic after the pandemic period, especially in the design department of the game technology study program, were held in blended learning. Blended learning is the right choice of learning because it needs adaptation from lecturers and students, where previously learning was held fully online, now it is held online and offline. Blended learning activities can be very effective and efficient in their implementation if the learning process is well prepared. One of the learning activities carried out is independent learning activities. Therefore, this study aims to produce a learning application that can be used as an independent learning module so that students can learn without being assisted by anyone just by using this independent learning module. The approach taken is the ADDIE development method. The ADDIE development model consists of five stages, namely analysis, design, development, implementation, and evaluation. Expert response to this learning application is a crucial thing to do. This application is evaluated by an expert with a background in graphic design, learning media, and communication. The independent learning module application was successfully developed and implemented in semester 3 of the 2-dimensional game programming course.
Perkembangan industri perangkat android pada tahun 2020 mengalami peningkatan malampai panjualan iOS Apple, yang mencari developer aplikasi android banyak dicari oleh industri kreatif. Banyak peserta yang kurang dalam keterampilan membuat aplikasi android. Diharapkan dengan pelatihan ini peserta yang mengikuti pelatihan mendapat gambaran dan pengetahuan tentang aplikasi android dan dapat mempersiapkan portofolio yang lebih baik untuk melamar pekerjaan. Metode pelatihan terdiri dari kegiatan presentasi, tanya jawab, simulasi media dan praktik membuat aplikasi secara langsung. Peserta mendapat softskill prinsip-prinsip dasar mendesain dan membuat code aplikasi , serta mampu dalam mengoperasikan software android studio.Tolak ukur keberhasilan dalam kegiatan ini kehadiran peserta mencapai angka lebih 80 % dari pendaftar
Alur. Penulis melihat permasalahan yang sedang dihadapi oleh Karang Taruna di antaranya karena kurangnya edukasi yang didapat di sekolah, di masyarakat, dan di rumah. Selain itu, kemudahan dalam mengakses aplikasi atau situs pornografi serta kurangnya pengawasan dari orang tua atau guru menjadi latar belakang diterapkannya aplikasi keamaan internet dari konten pornografi ini. Kegiatan ini berwujud pelatihan yang dilaksanakan selama dua hari, yakni materi pengenalan dasar menggunakan aplikasi, menganalisis aplikasi dan media yang digunakan untuk mengakses pornografi, serta penerapan aplikasi keamanan internet. Metode yang digunakan adalah observasi, pelatihan, dan evaluasi. Hasilnya, para peserta dari Karang Taruna mendapatkan wawasan dalam penggunaan handphone dan komputer agar dapat menjaga mereka dalam ancaman konten pornografi, mampu menggunakan aplikasi untuk mengelola konten pornografi pada handphone dan komputer yang dapat dimonitor. A B S T R A C T Internet Security Implementation Application for Pornographic Content on Karang Taruna in Tegal AlurSubdistrict. The author sees the problems faced by Karang Taruna, among others, due to the lack of education obtained at schools, in the community, and at home. In addition, the ease of accessing pornographic applications or sites and the lack of supervision from parents or teachers are basic reasons to implement an internet security applications for pornographic content. This activity took the form of training which was held for two days, namely basic introduction material to use applications, analyze applications and media used to access pornography, and implement internet security applications. The methods used are observation, training, and evaluation. As a result, the participants from Karang Taruna gained insight into the use of cellphones and computers in order to protect them from the threat of pornographic content, able to use applications to manage pornographic content on cellphones and computers that can be monitored.
Dalam era globalisasi saat ini teknologi informasi dan komputer akan memegang peranyang sangat menentukan dalam persaingan bisnis. PT. Bangsawan Cyberindo merupakan perusahaan yang bergerak dalam bidangpenjualan barang dan jasa teknologi informasi. Saat ini sistem informasi penjualan yang digunakan masih belum memaksimalkan penggunaan komputer, sehingga masihterdapat kegiatan yang menggunakan pencatatan secara manual. Dengan masih adanyapencatatan secara manual membuat staf penjualan mengalami kesulitan dalam halpencatatan data penjualan barang yang kurang akurat, lambat, dan tidak lengkap sehinggamenimbulkan keterlambatan dalam pelaporan data penjualan barang. Selain dari itu prosesakuntansi belum dilakukan dengan baik, sehingga laporan-laporan yang menggambarkanlaporan keuangan yang di perlukan belum tersedia. Oleh sebab itu, melalui penulisan ini penulis mengajukan usulan dengan memanfaatkan berupa rancang bangun sistem informasipenjualan yang mencakup kegiatan penjualan pada PT.Bangsawan Cyberindo.Dengan adanya sistem informasi ini maka pencatatan data lebih mudah dan menunjang kelancaran dalam sistem informasi penjualan. Selain itu memudahkan proses pencetakanlaporan berdasarkan periode yang diinginkan sehingga dapat mengetahui informasi dengan mudah, cepat,akurat, dan meminimalkan kesalahan.Sistem dirancang dengan metodologi berorientasi obyek, dan diimplementasikan denganmenggunakan bahasa pemerograman Visual Studio 2005 dan MS Access sebagaibasis datanya.
The encryption process in each information system security element is very important, some activities that connect an information system must have a good level of encryption to prevent a system from being hacked. The side of the system that uses a server must also have a good level of security, both in terms of the level of ability to ward off certain malware or phishing in the encryption system. The Security Information Management System (SIMS) secures several data security settings, including in a server. It is hoped that this research can have one main objective, which is an alternative method of dividing server conditions into multiple server accounts that makes data security conditions more secure. The partial cloud server method can also balance the server system overload conditions to be easy to control. Several separately created IP (Internet Protocol) addresses cause the hacker test group to switch to the IP address
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.