Smartphones today has become a necessity, including for children. Today, many children are used to using smartphones. Children often play games, watch youtube, enjoy chatting in social media and use Google for information search. This can be a good step so that children easily adapt to technology but can also have a negative impact. Parents must be vigilant if they see children often playing smartphones. It is important for parents to be able to control and supervise the use of children's smartphones. One solution is to use the Parental Control application. This smartphone child application can be set which applications are permitted and restrictions on playing time can be controlled. This is very good for healthy internet use among children. Screen Time is a parental control application that is useful for selecting, limiting, and supervising children's smartphone usage. This application has many features of control, supervision, scheduling and giving additional rewards for playing time if the child is doing a good assignment. By using these apps children can be set to play smartphones according to family need .
Dunia internet merupakan jaringan global yang dipublikasikan kepada umum. Didalam internet ditemukan berbagai macam tindakan positif dan negative. Kalau berbicara dalam jaringan pada internet, lalu lintas informasi sudah sangat cepat. Jaringan internet masa sekarang sudah semakin mutakhir, Maka perlu keamanan untuk mengantisipasi perbuatan negative di internet. Salah satunya dengan berhati-hati dan bijak dalam mengambil aplikasi dari internet dan selalu menjaga kerahasiaan, serta menggunakan Anti Virus untuk membentengi sistem komputer untuk mencegah terjadi sesuatu yang tidak di inginkan pada saat sedang melakukan aktifitas yang terkoneksi dengan internet, seperti menyusupnya virusvirus seperti adware, spyware, malware, dan lainnya kedalam komputer kita dan mengawasi aktifitas surfing kita di dunia Internet. Virus spyware merupakan program yang dibuat untuk memata-matai komputer korbannya. Bila sudah terinfeksi virus spyware sudah tidak ada rahasia lagi dalam komputer korban. Dalam percobaan spyware menggunakan aplikasi Vmware akan membuat dua komputer virtual. komputer pertama sebagai penyerang dan satu lagi menjadi target serangan spyware. Dua komputer virtual diciptakan menggunakan aplikasi vmware. Penyerang menggunakan sistem operasi backtrack untuk menyerang target, sedangkan target korban menggunakan sistem operasi windows. Aktifitas dari komputer target yang terkena virus spyware terlihat segala aktifitasnya bisa dipantau, dikontrol bahkan bisa juga di ambil alih kewenangan sistemnya.
Ecotourism development strategy in Kelimutu National Park (KNP) is very necessary because KNP has enormous potential for ecotourism development. The potential is either in the form of flora, fauna, geology, environmental beauty, and cultural potential of the surrounding community. The aims of this study are to know the right strategy in ecotourism development and determine the priority scale of ecotourism pathways development in KNP. This study uses a case study approach. Data were collected through in-depth interviews of KNP management, stakeholders in the management of ecotourism of KNP, communities around KNP, and observation. The data were analyzed using stakeholders analysis to determine the stakholders that involved on ecotourism management in KNP, SWOT (Strength, Weakness, Opportunities, Threats) analysis to determine the right strategy in ecotourism management, and AHP (Analysis Hierarcy Process) to determine the priority scale of ecotourism development from several ecotourism pathway in KNP. The results show that the most appropriate strategy in the development of ecotourism in KNP is offensive strategy (taking advantage of opportunities and strengths owned), and ecotourism pathway that get the first priority to be developed is the Moni Pathway, the second is Wologai Pathway, the third is Sokoria Pathway, and the fourth is Niowula Pathway.
Sistem kasir pada badan usaha Toko Warna masih menggunakan pelayanan penjualan yang masih cara manual, yaitu kasir hanya menggunakan perhitungan manual dengan sebuah kalkulator dan pendataan barang masih manual dan mengakibatkan sangat tidak efektif dan efisien dalam melakukan transaksi. Fasilitas dan pelayanan terhadap kasir diharapkan dapat diberikan secara otomatis sehingga tidak mengganggu dalam transaksi pada pelanggan, dan apabila terjadi kasir tidak perlu memberikan pelayanan yang secara manual. Model implementasi sistem kasir berbasis web memungkinkan sistem digunakan oleh kasir dan admin secara otomatis menghitung pemesanan barang dalam transaksi penjualan. Penggunaan sistem kasir berbasis web ini dapat melihat grafik penjualan yang di masukan dalam sistem sehingga pemilik toko dapat memantau kenaikan atau penurunan dalam bertransaksi. Metode yang akan digunakan adalah Metode Spiral yaitu model proses perangkat lunak yang memadukan wujud pengulangan dari model prototyping aspek pengendalian dan sistematika. Perancangan sistem informasi kasir penjualan barang toko serba ada pada toko warna melakukan transaksi, pengolahan data, dan pencetakan laporan yang secara otomatis berbasis web apabila berjalannya akan terjadi perubahan sistem yang tadinya manual menjadi terkomputerisasi.
<p><em>In recent years cases of cyber attacks that lead to website security have increased. The most widely used website hacking threat is sql injection. By using the sqlmap tool that runs on the Kalilinux operating system, attackers can easily take over very important user authentication data with their passwords. Attackers only use a special SQL query script using the python programming language will force the web server to output database information, tables, columns and data contents. This sql injection technique is not difficult, knowing how sql injection works is expected to be useful for web admins and web application developers to be able to secure user access from attackers. This attack simulation uses a virtual machine, by creating two virtual computers that are scripted as the attacker and the target server. By testing through this simulation, we can find out how the attack process and the consequences of attacks carried out by attackers.</em></p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.