Minggu, 18 Desember 2011

Itinerary For Tourist's Journey While in Bali
*Negara Asal Wisatawan - Bali
Date: 19 desember 2011- 21 desember 20

Hari Pertama
Senin 19 Desember 2011
o   10.00                   Tiba di Bandara Internasional Ngurah Rai Denpasar Bali
o   10.00 – 11.00      Perjalanan menuju hotel Mercure Kuta
o   11.00 – 13.00      Isitirahat lalu makan siang di hotel
o   13.00 – 14.00      Perjalanan menuju Desa Wisata Penglipuran – Bangli
o   14.00 – 15.00       Menikmati keindahan Desa Penglipuran dengan tour guide  profesional
o   15.00 – 16.30      Menyaksikan upacara adat dan keagamaan warga Desa Penglipuran  16.30 – 17.30     Acara bebas, wisatawan dapat berinteraksi dengan para warga               dan berfoto sebagai kenang – kenangan
o   17.30 – 18.30     Kembali ke hotel
o   18.30 – 19.30     Beristirahat dan bersiap untuk makan malam
o   19.30 – 21.00     Menikmati makan malam seafood di Pantai Jimbaran
o   21.00                   Acara bebas bagi para wisatawan





Hari Kedua
Sabtu, 26 November 2011
o   08.00 – 09.00      Menikmati breakfast di hotel
o   09.00 – 10.00       Bersiap – siap untuk perjalanan hari kedua
o   10.00 – 11.30        Perjalanan menuju Desa Di daerah pegunungan sekitar Kintamani
o   11.30 – 14.00        Melihat para pemandangan gunung dan kawah
o   14.00 – 15.30       Makan siang di dekat objek wisata di daerah gunung batur
o   15.30 – 17.30       Menyaksikan Candi Pura Ulun Danu menawarkan sebuah pemandangan Gunung Batur yang menawan.
o   17.30 – 19.00       Perjalanan kembali ke hotel
o   19.00 – 20.00       Beristirahat dan bersiap untuk makan malam
o   20.00 – 22.00      Makan malam di Lais Restaurant, Kuta
o   22.00                        Acara bebas

Kintamani
Di daerah pegunungan sekitar Kintamani, terdapat Gunung Batur dengan danau kawah yang dalam dan mata air panas yang bergolak. Udara pegunungan yang sejuk disertai pemandangan ke seluruh arah, sama indahnya dengan keberadaan beberapa candi penting, yang telah membuat Kintamani menjadi salah satu tempat yang tidak terlupakan dalam agenda wisatawan Bali.
Gunung Batur sebenarnya hanya merupakan salah satu gnung berapi kecil, namun letaknya berada di tengah-tengah kawah besar berdiameter 14 Km. Selain itu, Gunung Batur bersebelahan dengan Danau Batur yang berbentuk sabit yang dikelilingi tembok tinggi pinggiran kawah. Ukuran kecuraman kawah akan membuat Anda membayangkan letusan dahsyat dari Gunung Batur yang terjadi sepuluh ribu tahun yang lalu.
Gunung ini masih aktif sampai sekarang seperti penduduk Bali yang masih mengingat letusan yang terjadi pada tahun 1917 tersebut dimana erupsi tersebut telah mengambil ribuan nyawa dan menghancurkan ratusan candi. Erupsi lainnya sering terjadi setelah kejadian tersebut, sehingga memaksa masyarakat lokal untuk diungsikan, bersama dengan beberapa candi meliputi salah satu candi utama Bali, Pura Ulun Danu. Candi Pura Ulun Danu yang semula berada di dalam kawah yang besar, kemudian dipindahkan ke puncak bukit. Sekarang, Candi Pura Ulun Danu menawarkan sebuah pemandangan Gunung Batur yang menawan.

 Hari 3
21 desember 2011 adalah dicapai *

21 Desember 2011
* 05.30-06.00, Sarapan di hotel dan membeli makanan ringan dan minuman.
     * 06.10-07.00, pergi ke Panorama di Desa Blimbing Pupuan, Tabanan.
     * 07.10-11.45, Menjelajahi lanskap keindahan Panorama Pupuan.
     * 12,00-13,00, Makan siang dan istirahat untuk sementara waktu.
     * 13,10-14,00, terus mengeksplorasi keindahan alam Pupuan Panorama itu.
     * 14,15-16,10, kembali ke hotel dan beristirahat.
     * 16,30-19,00, pergi ke Pantai Kuta dan belanja suvenir di toko-toko terdekat Kuta Beach.
     * 19.30-08.00, makan malam di restoran Kuta dekat Pantai, pergi ke hotel dan beristirahat.
Catatan: Desa Sidetapa adalah desa Bali Aga atau desa tua di Bali yang diperkirakan telah exsisted sejak 75 tahun Masehi lalu. Yang unik dari desa ini adalah mereka memiliki rumah-rumah unik dari leluhur mereka yang masih menjaga dengan baik oleh generasi ke generasi sampai sekarang.
Ada menipiskan menarik untuk dicatat dengan baik ketika mengunjungi rumah-rumah. Mulai dari rumah berpola berpola persegi panjang yang dibagi menjadi tiga bagian yaitu Jeroan, Jaba Tengah, dan bencingah.These tiga bagian dimeteraikan dengan dinding kayu berpintukanwood juga. sendiri terdiri dari beberapa sekatan shrine.While kecil di Jaba Tengah adalah sebuah kuil ke ruang leluhur, dapur dan ruang dan pintu masuk ruangan untuk rumah.



Rabu, 30 November 2011

Task 8 Online

Hardware and Software

1. What do you know about the hardware and software?· Hardware or hardware is often referred to as an object of the present computer can be viewed and in touch with our sense of touch. hardware is forming device of the computer, while software and other supporting components of a computer.Components - Basic Hardware Components:- Monitor- Keyboard- Mouse- CPU· Understanding Software is a collection of electronic data is stored and regulated by the computer, electronic data stored by the computer it can be either programs or instructions that will run a perintah.Software or computer software based on its distribution can be divided into several types, namely paid software, free software or free (freeware, free software, shareware, adware)
2. Why is the role of hardware is needed in the processing of information? Explain!Because the hardware can work on orders that have been specified therein, or also called by the term instruction set.Dengan of commands that can be understood by the hardware, the hardware can meelakukan various activities that have been specified by the command.Physically, the computer consists of several components, which is a component system.Sistem are working together to form a union, if one component does not work, will result in malfunction of computer processes well. Computer components are included in the category of hardware elements.Computers are divided into:· Input device (input units)· Process device (processing unit)· Output device (output units)· Backing Storage (storage unit)· Peripherals (additional units)
The basic components of the computer consists of input, process, output and storage. Input device consists of a keyboard and mouse, the process device is a microprocessor (ALU, Internal Comminication, Registers and Control section), Output devices consist of a monitor and printer.
3.Apa you know about Operating System Software?Computer operating systems are computer software or software that is tasked to perform the control and management of hardware and basic system operations, including run software applications such as data processing programs that can be used to facilitate human activity. Operating Systems in English is called Operating System, or usually in short with the OS.Operating system software on your computer is a first layer that is placed on computer memory, (computer memory in this case there are hard drive, rather than ram memory) when the computer starts up. While other software is run after running the Operating System Computer, and Systems Operations will perform the core public service for the software. Common core services such as access to the disk, memory management, task scheduling, and user interface. So that each software no longer need to perform the core duties of the public, because it can be served and performed by the operating system. Section of code that perform the core duties and the general was named by an Operating System kernel.Operating system serves as a liaison between the hardware layer and software layer. in addition, the computer Operating System is also doing all the important commands in the computer, and ensure that different applications can run smoothly functioning simultaneously without a hitch. Computer Operating System ensures other software applications can use the memory, perform input and output to other equipment, and have access to the file system. If multiple applications running simultaneously, then the Computer Operating Systems will arrange a proper schedule, so that as much as possible all the processes running on computers that have enough time to use the CPU and not mutually interfere with other devices.Examples of such computer operating system is Windows, Linux, MacOS, etc.
4. Why Software applications desperately need the operating system? Explain!Software application is a program that has a command processing activities necessary to execute user commands with a specific purpose. So if the lack of the operating system command given by the user to the software can not be processed, because everything comes from the operating system.

Sabtu, 19 November 2011

COMPUTER-BASED INFORMATION SYSTEM - CBIS

1. What do you know about CBIS?
    Computer-Based Information Systems or Computer Based Information System (CBIS) is a data processing system into a high quality information and can be used as a tool to support decision-making, coordination and control as well as the visualization and analysis.
Data is a description of things and events that we hadapi.Jadi in essence, is the fact that the data describing an event and is a real unity that will be used as a basic ingredient information.
Information is the result of processing the data into a form more useful for those who accept that describes a real events and can be used as a tool for decision making.
System is an entity, whether abstract or concrete, which consists of several components that are interlinked with each other. Objects that have no connection with the elements of a system is not a component of the system.
Information System is a system of generating information. With the integration between subsystems owned, information systems will be able to provide quality information, precise, fast and accurate in accordance with management who need them.
Information Systems' computer-based "means that the computer plays an important role in an information system. In theory, the implementation of an Information System does not have to use a computer in its activities. But in practice it is not possible highly complex information systems that can work well if the absence of a computer. Information systems are accurate and effective, in fact, is always associated with the term "computer-based" or processing information based on the computer.
2.What is the role of information specialists to the development of CBIS?
Business application of computers in business has been greatly developed along with the development of information technology in the world. The stages of development, namely: 1. At the beginning of the data (electronic data processing - EDP)With the technology and keydriven punched card bookkeeping machine, and companies generally ignore the information needs of managers.2. On Information (Management information system - MIS)With the introduction of calculators that allow processing of more and faster. It is oriented to the concept of using computers as a management information system (MIS).3. In decision making (decision support system - DSS)DSS is a different thing from the SIM. DSS is a system aimed at producing information for a specific problem to be solved and decisions taken by managers.4 In the communication (office automation - OA)OA komunikais facilitate and enhance the productivity of managers and office workers through the use of office equipment. OA has been developed covering a variety of applications such as remote conferencing, voice mail, e-mail, electronic calendaring, facsimile transmission and desktop publishing.5. In Consultation (artificial intelligence / expert systems - AI / ES)The basis of the AI ​​is a computer can be programmed to perform some logical reasoning is the same as humans.
People who are responsible for the development and maintenance of computer-based systems, namely:
      1.
Systems Analyst
  

      2.
DataBase Administrator
  

      3.
Network Specialist
  

      4.
Programmer
  

     
5.Operator

Here is the system followed the CBIS development life cycle:

     
1.Planning Phase
      2.
Phase Analysis
     
3.The design phase
     
4.Implementation Phase
     
5.Stage of Use


CoverCBIS is a system that helps people dala process data into more useful information, especially for the data base within the company.

information security systems


1.What is the purpose of information needs to be secured? Explain and give examples of your answer!
   The purpose of information management is to protect the confidentiality, integrity and availability of information. With the growth of various scams, espionage, viruses, and hackers have threatened the business information management due to the increased transparency of information and less control / control is done through modern information technology. As a consequence, increasing expectations of business managers, business partners, auditors, and other stakeholders requires effective information management to ensure the information that ensures business continuity and meminimise business damage by preventing and memimise impact of security inciden.
keep confidential information protected from a variety of possible damage due to improper storage or possible stolen by persons or parties who are not entitled to have that information. All organizations have confidential information that is deemed confidential information so that every effort should be made yntuk guarantee that such information does not fall into the hands of people or parties who are not eligible. The cost of information storage, these considerations about the efficiency factor must be considered given the company has a lot of information is intentionally collected for the benefit of the organization in the future so that the selection of appropriate technology will be in order to save storage costs, and when they are no longer required, either the data or information should dealt with the removal, in addition to saving storage space is important is to maintain the confidentiality of the data or information.


2. What does the manager if the information is accurate, and relevant insecure?
   What should be done by the Manager when the information is accurate and relevant to be unsafe is the manager will immediately alert followed up with a way to make aspects of privacy or confidentiality. where the effort to keep information from people who are not authorized to access. It also acts as a way of re-evacuation information in the can so that information can be in error if there happens to inaccurate information. If the information in the can not be in use, then the manager should seek information that is completely up to date, accurate, relevant and gated.
3.How do the stages in securing information? tell   In general, the security can be categorized into two types: prevention (preventive) and treatment (recovery). Prevention efforts carried out so that information systems do not have security holes, while efforts carried out if the treatment has been exploited security holes.

    
* Set up access (Access Control)
One method commonly used for securing information is to regulate access to information through the mechanism of "authentication" and "access control". Implementation of this mechanism, among others, by using the "password".

    
* Closing the service that is not used
Often the system (hardware and / or software) is given with some services running as a default. For example, on UNIX systems the following web services are often installed from the vendor: finger, telnet, ftp, smtp, pop, echo, and so on. The service is not all it takes. To secure the system, unneeded services on the server (computer) should be turned off.

    
* Installing Protection
To further enhance the security of information systems, protection can be added. This protection can be a filter (in general) and the more specific is the firewall. Filters can be used to filter e-mail, information, access, or even in the packet level.

    
* Firewall
A firewall is a device that is placed between the Internet to internal networks. Outgoing or incoming information must pass through this firewall. The main purpose of a firewall is to keep (Prevent) to access (inside or out) of person who is not authorized (unauthorized access) can not be done.

    
* Monitoring of the attacks
Monitoring systems (monitoring system) is used to determine the presence of uninvited guests (an intruder) or of an attack (attack). Another name of this system is "an intruder detection system" (IDS). The system can notify the administrator via e-mail or through other mechanisms such as via pager.

    
* Monitoring the integrity of the system
Monitoring the integrity of the system is run periodically to test the system integratitas. One example of a program commonly used on UNIX systems is the Tripwire program. Tripwire package program can be used to monitor the changes to the file.

    
* Audit: Observing Log Files
All (most) use activities can be recorded in the file system is usually called the "logfile" or "log" only. This log file is very useful for observing deviations that occur. Failure to enter the system (login), for example, is stored in log files. For that the administrators are required to diligently maintain and analyze the log file that has

    
* Backups are routinely
Sometimes an uninvited guest (intruder) into the system and damage the system by deleting files that can be encountered. If an intruder is breaking into the system and log in as super user (administrator), then there is a chance that he can delete the entire file.

Minggu, 13 November 2011

TOURISM INDONESIA MART & EXPO (TIME) 2011 IN LAMPUNG ON SUMATRA

TOURISM INDONESIA MART & EXPO (TIME) 2011 IN LAMPUNG ON SUMATRA

Physical Facilities and Equipments :
  1. Booths
  2. Table
  3. Chairs
  4. LCD
  5. Screen
  6. Big Screen
  7. Stage
  8. Sound Systems
  9. Standing MIC
  10. Wireless MIC
  11. Carpet
  12. Tempat Sampah
  13. Smoking area
  14. Rest room
  15. Lighting
  16. Platform
  17. Banner
  18. Bulletin Board
  19. Podium
  20. Internet Connection
  21. laptop / Computer 
  22. bahan/ dokumen Pendukung acara
  23. bunga, vas dan alat -alat dekorasi lainnya
  24. Spanduk acara yang di laksanakan
  25. Air conditioner / kipas besar
  26. Musholla
  27. Stand untuk acara
  28. Brosur/ pamplet
  29. Spidol, Balpoin
  30. Tempat / Stand Makanan & Minuman

Rabu, 26 Oktober 2011

Task 3 ( decision support systems )

Decision Support Systems

 Why use a systems manager for a decision that is not structured in because his top managers have the authority to take decisions that are structured and which unilaterally or in an unregulated or hard-wired in his company, he has enormous authority and right to decide, fire or also create a policy as you wish and goal of thought or idea is to advance the company's manager

and for the manager always uses a structured decision in because he must follow the rules of the company, especially his boss, he also has no right or authority to perform acts that are not structured, because it could be a new problem in leading a company, because the company no its control, evaluation and improvement of the system or policy that is not appropriate policy that will be renewed in the fox to be better and advanced, so that if the manager did not act in accordance with company regulations, the company will take action to give any sanction or dismiss her. so that manager must comply with the rules and follow all company primarily structured and make decisions in accordance with the policies, objectives of the company itself


Decision support system (DSS) is part of a computer-based information systems including knowledge based systems ataumanajemen knowledge used to support decision making within an organization or company. Can also be regarded as a computer systems that process data into information for making decisions of a specific semi-structured problems. According to Moore and Chang, decision support systems (DSS) can be described as a system capable of supporting analisisad hoc data, and modeling decisions, decision-oriented, future-oriented planning, and is used at times unusual. Meanwhile, according to Keen and Scott Morton, Decision Support System is an amalgamation of individual intelligence sources with the ability of components to improve the quality of decisions. Decision Support System is also a computer-based information systems for management decision-making that address issues semi-structure. With the above understanding can be explained that the decision support system (DSS) is not a decision making tool, but rather a system that helps decision-decisions by equipping them with information from the data that has been processed by the relevant and necessary to make a decision about a problem more quickly and accurately.

characteristics of decision support systems, among others: (1) Support the decision making process, focusing on management by perception (2) The existence of a human or machine interface in which the human (user) still holds control of decision-making process, (3) Support the decision-making to discuss problem of structured, semi structured and structure. , (4) Having a capacity of dialogue to obtain information in accordance with the requirement (5) It has subsystems are integrated in such a way that it can function as a unitary item. (6) Requires a comprehensive data structure that can serve the information needs of all levels

His case: when I worked at the front office in the hotel and there were guests who will check out and it turns out his bill there is a problem because he did not admit that he did not use the services of laundry, so she does not want to pay, and I thought to lie at or making it there, and threatened me in the report to the manager or GM because it has been difficult for her hotel room, when I was incharge own without a manager and my supervisor while living a clean hard to immediately leave the hotel because of the rush - rush to go to the airport, when it my confusion and take an idea, I contact the officer asks the guest laundry and laundry services and personnel using said yes and immediately sends a guest laundry list of evidence was used, from authentic evidence of my laundry workers showed unequivocally that the guest is using the services of laundry so that I took the decision to charge the firm because I was right and have the evidence, and finally he was paid by the guest embarrassed to leave the hotel.