Journal of Business, Social and Technology (Bustechno) http://bustechno.ridwaninstitute.co.id/index.php/jbt/issue/current

 

INVENTORY APPLICATION PROGRAM ON CV Y IN BANDUNG

 

Dwi Febri Syawaludin

Ridwan Institute, Cirebon, West Java, Indonesia

Email: [email protected]

 

 

 

Abstract

 

 

 

Article Information:

Received

Revised

Accepted

 

 

Keywords:

inventory; application; program

Technology and Information are two things that cannot be separated today. This can be seen from the process to get information that can be obtained quickly, accurately, and accurately supported by increasingly sophisticated technological advances. This technological advancement makes many corporate agencies engaged in pawnshops use computer-based technology and networks to help their work because it is effective and efficient. Design of computer programs that the author made, it will soon be known what are the transactions without long in opening the documents. If the calculation process is applied computerized within the company, then the process will be very easy, automatically calculated and programmed so as not to waste a long time.� Because the results of this programming process will be good in the office work cycle every day and very effective and efficient. The process of storage and input that is done dangan a programming that the author makes easy Pawnshop Prima Pawn in the process of data collection. In addition, citations also support the development of information technology..

 

 


Introduction

Technology and Information are two things that cannot be separated today. This can be seen from the process to get information that can be obtained quickly, accurately, and accurately supported by increasingly sophisticated technological advances (Brynjolfsson & McAfee, 2014). This technological advancement makes many corporate agencies engaged in pawnshops use computer-based technology and networks to help their work because it is effective and efficient (Anhar, Advinda, & Hariati, 2017).

Companies that have used computerized systems in processing their data. Prima Gadai itself is one of the companies that have a complete system but in the processing of data is still done manually, which requires all data to be processed properly, stored neatly (Munthe, 2015).

Prima Gadai itself for data processing is still applying manual methods such as inputting consumer data and repayment on pawnshops. These processes have their own complexities related to the facilities that are available (Benjamin, 2014). It also raises a variety of other problems such as the process of delivering reports that are not timely, the volume of data released is quite large, data searches that take a long time, and will make it difficult for users in reports and consumer data collection due to too much data (Rauber & R�nger, 2013). Therefore, many pawnshop companies are looking for solutions to improve quality and quality by adapting to technology development that is very related to these companies. One form of information technology needed to support the success of achievement is computers, where the role of computers has become a vital part of activities in facilitating work. Computerized systems are the answer to technological breakthroughs in the problem-solving problems that exist in Prima Gadai in consumer data collection today (Kuper, Libkin, & Paredaens, 2013).

 

Methods

The research was conducted at CV Y in Bandung research method using qualitative deriktif. Data obtained from interview data sources obtained from documents and informants. Research informants are managers, staff and primary documents from CV Y in Bandung. Data analysis is carried out with interactive technical analysis, which includes data collection, data presentation, data reduction and conclusion making.

Based on the data collected related to the problem. The data can be grouped into two types of data, namely:

1.    Primary data

Primary data is data obtained from research objects to collect the data needed by the author using various means, among others:

a.     Interview / Interview

Data collection method by conducting question and answer systemically and based on the purpose of discussion

b.    Observation

Data collection techniques by observing directly in prima pawn

2.    Secondary Data

Secondary data is data obtained indirectly that can be obtained through books or websites related to the problems faced today.

 

Results and Discussion

A.   System Design

System design consists of ERD, normalization, HIPO structure, program flowchart and program display design (Jayanti & Sumiari, 2018).

1.    Entity Relationship Diagram / ERD

In the previous chapter it has been explained about the understanding of ERD, and in this chapter the author will create an ERD based on the application program to be created (Yasin, Zarlis, & Nasution, 2018).

 


Figure 1

Entity Relationship Diagram (ERD)

 

a.     Normalization

Figure 2

Second Normal Form (Von Zur Gathen, 2014)

 

 

 

 

 

1)    Structure HIPO

Figure 3

HYPO Structure

 

2.    Flowchart Program

a.     Flowchart Login dan Main Menu

Figure 4

Flowcart Login and Main Menu

 

 

 

 

 

 

 

b.    Flowchart Consumer Data

Figure 5

Flowcart Data Menu Contingency

 

c.     Flowchar Consumer Loan Data Menu

Figure 6

Flowcart Data Menu Loan Contingency

 

 

 

 

 

 

 

 

 

 

d.    Flowchart Menu Extension

 

Figure 7

Flowchart Menu Extension

 

e.     Flowchart Repayment Menu

Figure 8

Flowcart Repayment Menu

 

f. Flowchart� Menu Harga Taksir

Figure 9

Flowcart Menu Estimated Prices

 

B.   Implementation

Implementation consists of relationships between tables, database structure and program end result as follows:

Relationships Between Tables

Diagram 17 Relationships Between Tables

Figure 10

Relationships Between Tables

 

1.    Database Structure

The database used in the creation of the Prima Gadai Bekasi Consumer Data Collection Application Program is using Microsoft Access 2007 and databases (Widodo & Kurnianingtyas, 2017).

 

Table 2

Consumer Data Table

Field

Data Type

Size

No ID

Autonumber

6

Nama

Text

50

Alamat

Text

150

No HP

Text

12

 

Table 3

Consumer Data Collection Table

Field

Data Type

Size

No ID

Autonumber

6

Nama

Text

60

Alamat

Text

160

No HP

Text

12

Nama Barang

Text

20

No IMEI

Text

12

Serial Number

Text

12

Kelengkapan

Text

100

Keterangan

Text

100

Jumlah Pinjaman

Number

Long Integer

Tanggal Transaksi

Date/Time

-

Lama Pinjaman

Number

Long Integer

Tanggal Pengembalian

Date/Time

-

Total

Number

Long Integer

 

 

 

2.    Main Menu, Input and Output Display

a.     Login

 

Figure 11

Login Input Form

 

 

 

b.    Main Menu View

 

Figure 12

Main Menu Form Consumer Data Input

 

c.     Login Data Input

 

Figure 13

Consumer Data Form

 

 

 

 

 

 

 

 

 

 

 

d.    Consumer Renewal Input

 

Figure 14

Consumer Renewal Form

 

e.     Consumer Repayment Input

Figure 15

Consumer Repayment Form

 

 

 

 

 

 

 

 

 

 

f.     Pawn Data Report

 

Figure 16

Pawn Report Form

 


Conclusion

The conclusions are as follows: First, with the design of computer programs that the author made, it will soon be known what are the transactions without long in opening the documents. Second, If the calculation process is applied computerized within the company, then the process will be very easy, automatically calculated and programmed so as not to waste a long time.� Because the results of this programming process will be good in the office work cycle every day and very effective and efficient. Third, the process of storage and input that is done dangan a programming that the author makes easy Pawnshop Prima Pawn in the process of data collection. In addition, citations also support the development of information technology.

 

REFERENCES

 

Anhar, Azwir, Advinda, Linda, & Hariati, Desi. (2017). Peningkatan Hasil Cabai Merah (Capsicum Annum L.) Dengan Penambahan Pupuk Organik Cair Tunika. Google Scholar

Benjamin, Nico. (2014). Analisis Pengaruh Program Quality Assurance Terhadkualitas Audit Internal. Universitas Mercu Buana. Google Scholar

Brynjolfsson, Erik, & Mcafee, Andrew. (2014). The Second Machine Age: Work, Progress, And Prosperity In A Time Of Brilliant Technologies. Ww Norton & Company. Google Scholar

Jayanti, Ni Ketut Dewi Ari, & Sumiari, Ni Kadek. (2018). Teori Basis Data. Penerbit Andi. Google Scholar

Kuper, Gabriel, Libkin, Leonid, & Paredaens, Jan. (2013). Constraint Databases. Springer Science & Business Media. Google Scholar

Munthe, Ashiong P. (2015). Pentingnya Evaluasi Program Di Institusi Pendidikan: Sebuah Pengantar, Pengertian, Tujuan Dan Manfaat. Scholaria: Jurnal Pendidikan Dan Kebudayaan, 5(2), 1�14. Google Scholar

Rauber, Thomas, & R�nger, Gudula. (2013). Parallel Programming. Springer. Google Scholar

Von Zur Gathen, Joachim. (2014). Normal Form For Ritt�s Second Theorem. Finite Fields And Their Applications, 27, 41�71. Google Scholar

Widodo, Agus Wahyu, & Kurnianingtyas, Diva. (2017). Sistem Basis Data. Universitas Brawijaya Press. Google Scholar

Yasin, Verdi, Zarlis, Muhammad, & Nasution, Mahyuddin K. M. (2018). Filsafat Logika Dan Ontologi Ilmu Komputer. Journal Of Information System, Applied, Management, Accounting And Research, 2(2), 68�75. Google Scholar

Copyright holder :

Dwi Febri Syawaludin (2021)

 

First publication right :

Journal of Business, Social and Technology (Bustechno)

 

This article is licensed under: