Journal of Business, Social and Technology (Bustechno) http://bustechno.ridwaninstitute.co.id/index.php/jbt/issue/current |
INVENTORY
APPLICATION PROGRAM ON CV Y IN BANDUNG
Dwi
Febri Syawaludin
Ridwan Institute,
Cirebon, West Java, Indonesia
Email: [email protected]
|
Abstract |
Article
Information: Received Revised Accepted Keywords: inventory;
application; program |
Technology
and Information are two things that cannot be separated today. This can be
seen from the process to get information that can be obtained quickly,
accurately, and accurately supported by increasingly sophisticated
technological advances. This technological advancement makes many corporate
agencies engaged in pawnshops use computer-based technology and networks to
help their work because it is effective and efficient. Design of computer
programs that the author made, it will soon be known what are the
transactions without long in opening the documents. If the calculation
process is applied computerized within the company, then the process will be
very easy, automatically calculated and programmed so as not to waste a long
time.� Because the results of this
programming process will be good in the office work cycle every day and very
effective and efficient. The process of storage and input that is done dangan
a programming that the author makes easy Pawnshop Prima Pawn in the process
of data collection. In addition, citations also support the development of
information technology.. |
Introduction
Technology and Information
are two things that cannot be separated today. This can be seen from the process
to get information that can be obtained quickly, accurately, and accurately
supported by increasingly sophisticated technological advances (Brynjolfsson & McAfee, 2014). This technological
advancement makes many corporate agencies engaged in pawnshops use computer-based
technology and networks to help their work because it is effective and efficient (Anhar, Advinda, & Hariati, 2017).
Companies that
have used computerized systems in processing their data. Prima Gadai itself is
one of the companies that have a complete system but in the processing of data
is still done manually, which requires all data to be processed properly,
stored neatly (Munthe, 2015).
Prima Gadai
itself for data processing is still applying manual methods such as inputting
consumer data and repayment on pawnshops. These processes have their own
complexities related to the facilities that are available (Benjamin, 2014). It also raises a variety of
other problems such as the process of delivering reports that are not timely,
the volume of data released is quite large, data searches that take a long
time, and will make it difficult for users in reports and consumer data collection
due to too much data (Rauber & R�nger, 2013). Therefore, many pawnshop
companies are looking for solutions to improve quality and quality by adapting
to technology development that is very related to these companies. One form of
information technology needed to support the success of achievement is
computers, where the role of computers has become a vital part of activities in
facilitating work. Computerized systems are the answer to technological
breakthroughs in the problem-solving problems that exist in Prima Gadai in consumer
data collection today (Kuper, Libkin, & Paredaens, 2013).
Methods
The research was
conducted at CV Y in Bandung
research method using qualitative deriktif. Data obtained from interview data
sources obtained from documents and informants. Research informants are
managers, staff and primary documents from CV Y in Bandung. Data analysis is carried
out with interactive technical analysis, which includes data collection, data
presentation, data reduction and conclusion making.
Based on the
data collected related to the problem. The data can be grouped into two types
of data, namely:
1.
Primary data
Primary data is data obtained from research objects to collect the data
needed by the author using various means, among others:
a.
Interview /
Interview
Data collection method by conducting question and answer systemically
and based on the purpose of discussion
b.
Observation
Data collection techniques by observing directly in
prima pawn
2.
Secondary Data
Secondary data is data obtained indirectly that can be obtained through
books or websites related to the problems faced today.
Results and Discussion
A. System Design
System
design consists of ERD, normalization, HIPO structure, program flowchart and
program display design (Jayanti & Sumiari, 2018).
1. Entity Relationship Diagram /
ERD
In the previous chapter it has been explained about the understanding of
ERD, and in this chapter the author will create an ERD based on the application
program to be created (Yasin, Zarlis, &
Nasution, 2018).
Figure 1
Entity Relationship Diagram (ERD)
a.
Normalization
Figure 2 Second Normal Form (Von Zur Gathen,
2014) |
1) Structure HIPO
Figure 3
HYPO Structure
2. Flowchart Program
a.
Flowchart
Login dan Main Menu
Figure 4
Flowcart Login and Main Menu
b.
Flowchart
Consumer Data
Figure 5
Flowcart Data Menu Contingency
c. Flowchar Consumer Loan Data Menu
Figure 6
Flowcart Data Menu Loan Contingency
d. Flowchart Menu Extension
Figure 7
Flowchart
Menu Extension
e. Flowchart Repayment Menu
Figure 8
Flowcart Repayment Menu
f. Flowchart�
Menu Harga Taksir
Figure 9
Flowcart Menu Estimated Prices
B. Implementation
Implementation consists of relationships between tables,
database structure and program end result as follows:
Relationships Between Tables Diagram 17 Relationships Between Tables |
Figure 10
Relationships Between Tables
1. Database Structure
The database
used in the creation of the Prima Gadai Bekasi Consumer Data Collection
Application Program is using Microsoft Access 2007 and databases (Widodo & Kurnianingtyas,
2017).
Table 2
Consumer Data Table
Field |
Data Type |
Size |
No ID |
Autonumber |
6 |
Nama |
Text |
50 |
Alamat |
Text |
150 |
No HP |
Text |
12 |
Table 3
Consumer Data Collection
Table
Field |
Data Type |
Size |
No ID |
Autonumber |
6 |
Nama |
Text |
60 |
Alamat |
Text |
160 |
No HP |
Text |
12 |
Nama Barang |
Text |
20 |
No IMEI |
Text |
12 |
Serial Number |
Text |
12 |
Kelengkapan |
Text |
100 |
Keterangan |
Text |
100 |
Jumlah Pinjaman |
Number |
Long Integer |
Tanggal Transaksi |
Date/Time |
- |
Lama Pinjaman |
Number |
Long Integer |
Tanggal Pengembalian |
Date/Time |
- |
Total |
Number |
Long Integer |
2. Main Menu, Input and Output
Display a. Login |
Figure 11 Login Input Form |
b.
Main Menu View Figure 12 Main Menu Form Consumer Data Input |
c. Login Data Input Figure 13 Consumer Data Form |
d. Consumer Renewal Input Figure 14 Consumer Renewal Form e. Consumer Repayment Input Figure 15 Consumer Repayment Form |
f. Pawn Data Report Figure 16 Pawn Report Form |
|
Conclusion
The conclusions are as follows: First, with the
design of computer programs that the author made, it will soon be known what
are the transactions without long in opening the documents. Second, If the
calculation process is applied computerized within the company, then the
process will be very easy, automatically calculated and programmed so as not to
waste a long time.� Because the results
of this programming process will be good in the office work cycle every day and
very effective and efficient. Third, the process of storage and input that is done
dangan a programming that the author makes easy Pawnshop Prima Pawn in the
process of data collection. In addition, citations also support the development
of information technology.
Anhar, Azwir,
Advinda, Linda, & Hariati, Desi. (2017). Peningkatan Hasil Cabai Merah
(Capsicum Annum L.) Dengan Penambahan Pupuk Organik Cair Tunika. Google Scholar
Benjamin, Nico. (2014). Analisis Pengaruh
Program Quality Assurance Terhadkualitas Audit Internal. Universitas Mercu
Buana. Google Scholar
Brynjolfsson, Erik, & Mcafee, Andrew.
(2014). The Second Machine Age: Work, Progress, And Prosperity In A Time Of
Brilliant Technologies. Ww Norton & Company. Google Scholar
Jayanti, Ni Ketut Dewi Ari, & Sumiari,
Ni Kadek. (2018). Teori Basis Data. Penerbit Andi. Google Scholar
Kuper, Gabriel, Libkin, Leonid, &
Paredaens, Jan. (2013). Constraint Databases. Springer Science &
Business Media. Google Scholar
Munthe, Ashiong P. (2015). Pentingnya
Evaluasi Program Di Institusi Pendidikan: Sebuah Pengantar, Pengertian, Tujuan
Dan Manfaat. Scholaria: Jurnal Pendidikan Dan Kebudayaan, 5(2),
1�14. Google Scholar
Rauber, Thomas, & R�nger, Gudula.
(2013). Parallel Programming. Springer. Google Scholar
Von Zur Gathen, Joachim. (2014). Normal Form
For Ritt�s Second Theorem. Finite Fields And Their Applications, 27,
41�71. Google Scholar
Widodo, Agus Wahyu, & Kurnianingtyas,
Diva. (2017). Sistem Basis Data. Universitas Brawijaya Press. Google Scholar
Yasin, Verdi, Zarlis, Muhammad, &
Nasution, Mahyuddin K. M. (2018). Filsafat Logika Dan Ontologi Ilmu Komputer. Journal
Of Information System, Applied, Management, Accounting And Research, 2(2),
68�75. Google Scholar
Dwi
Febri Syawaludin (2021) |
First publication right : Journal of Business, Social and Technology (Bustechno) |
This article is licensed under: |