Ease of understanding Accounting Computers in principle is influenced by mastery of Introduction to Accounting in a systematic manner, assuming that it is capable of operating computers properly. To find out the magnitude of the influence in this study taken a sample of introductory Accounting values from a number of first semester 2017 students and the same data sample for students of Computer Accounting (Accurate) courses when they are in the fourth semester 2018. Feasibility until the data is tested by the normality test to find out the distribution of data and by linearity test to obtain linear functions. The data that has been obtained and tested for its feasibility is processed by Linear Regression using SPSS 24. From the results of the research that has been done obtained a regression equation: Y = 67,953 0.35X, which describes each increase in the value of introductory Accounting one unit will affect 0.35 to Computer Accounting value, but in testing the hypothesis that the value of Introduction to Accounting obtained by students does not affect their ability to obtain Computer Accounting values, one of the causes of this is due to the lack of skills of students to operate computers.Keywords: influence, value, ability
{"title":"PENGARUH NILAI PENGANTAR AKUNTANSI TERHADAP KEMAMPUAN MAHASISWA MEMAHAMI KOMPUTER AKUNTANSI PADA PROGRAM STUDI PERBANKAN DAN KEUANGAN POLITEKNIK NEGERI MEDAN","authors":"Jantianus Jantianus, Khairul Khairul","doi":"10.30865/komik.v2i1.925","DOIUrl":"https://doi.org/10.30865/komik.v2i1.925","url":null,"abstract":"Ease of understanding Accounting Computers in principle is influenced by mastery of Introduction to Accounting in a systematic manner, assuming that it is capable of operating computers properly. To find out the magnitude of the influence in this study taken a sample of introductory Accounting values from a number of first semester 2017 students and the same data sample for students of Computer Accounting (Accurate) courses when they are in the fourth semester 2018. Feasibility until the data is tested by the normality test to find out the distribution of data and by linearity test to obtain linear functions. The data that has been obtained and tested for its feasibility is processed by Linear Regression using SPSS 24. From the results of the research that has been done obtained a regression equation: Y = 67,953 0.35X, which describes each increase in the value of introductory Accounting one unit will affect 0.35 to Computer Accounting value, but in testing the hypothesis that the value of Introduction to Accounting obtained by students does not affect their ability to obtain Computer Accounting values, one of the causes of this is due to the lack of skills of students to operate computers.Keywords: influence, value, ability","PeriodicalId":246167,"journal":{"name":"KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124150282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. D. A. Pardede, Mesran Mesran, Melda Panjaitan, Fince Tinus Waruwu, Puji Sari Ramadhan
The development of Indonesia's population at this time is very rapid so that Indonesia has many problems including poverty problems that occur in the midst of society. In dealing with these problems the government has a program with a form of social assistance known today as the Elderly Family Hope Program (PKH). In accordance with the Decree of the Director General of Social Protection and Security Number 26 / LJS / 12/2016 in terms of social assistance the Recipients are those that have been determined by the Director General of Social Family. As well as in the Distribution this assistance is distributed in four stages one Year. Decision Support System is a computer-based system consisting of several components, namely language system components, system components of knowledge, and problem processing system components that are interrelated with one another, in making decisions through the use of data. data and decision models in order to solve a problem. The VIKOR method where this method focuses on ranking and chooses from an alternative set and determines the solution to the problem of criteria that are constrained and can result in decision making as a final decision and the best ranking method is the lowest resultKeywords: Decision Support System, Vikor, Recipient of Family Hope Assistance
{"title":"SISTEM PENDUKUNG KEPUTUSAN PENERIMA BANTUAN KELUARGA HARAPAN KHUSUS LANSIA DENGAN MENERAPKAN VIKOR (STUDI KASUS: DESA PATUMBAK II)","authors":"S. D. A. Pardede, Mesran Mesran, Melda Panjaitan, Fince Tinus Waruwu, Puji Sari Ramadhan","doi":"10.30865/KOMIK.V2I1.920","DOIUrl":"https://doi.org/10.30865/KOMIK.V2I1.920","url":null,"abstract":"The development of Indonesia's population at this time is very rapid so that Indonesia has many problems including poverty problems that occur in the midst of society. In dealing with these problems the government has a program with a form of social assistance known today as the Elderly Family Hope Program (PKH). In accordance with the Decree of the Director General of Social Protection and Security Number 26 / LJS / 12/2016 in terms of social assistance the Recipients are those that have been determined by the Director General of Social Family. As well as in the Distribution this assistance is distributed in four stages one Year. Decision Support System is a computer-based system consisting of several components, namely language system components, system components of knowledge, and problem processing system components that are interrelated with one another, in making decisions through the use of data. data and decision models in order to solve a problem. The VIKOR method where this method focuses on ranking and chooses from an alternative set and determines the solution to the problem of criteria that are constrained and can result in decision making as a final decision and the best ranking method is the lowest resultKeywords: Decision Support System, Vikor, Recipient of Family Hope Assistance ","PeriodicalId":246167,"journal":{"name":"KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam
At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler
{"title":"REVERSE ENGINEERING ANALYSIS FORENSIC MALWARE WEBC2-DIV","authors":"Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam","doi":"10.30865/KOMIK.V2I1.902","DOIUrl":"https://doi.org/10.30865/KOMIK.V2I1.902","url":null,"abstract":"At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler","PeriodicalId":246167,"journal":{"name":"KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132881871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}