Majalah TI-1A 2019

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

The Excellent Study

In Mulia University
UNIVERSITAS MULIA
Global Technopreneur Campus

TI1A - INFORMATION TECHNOLOGY

Mulia
SEPTEMBER 2019
edition Magazine
EDITORIAL BOARD

Advisor Editor-in-Chief
Yamani,S.S.,M.Pd. Ferry Ananda F.

Editor Team Editor Team


Jihan Rizky M. Zahra Ananda S.

Designer & Designer &


Layout Team Layout Team
Andhika Setiawan Sahrun
LIST OF AUTHORS
1912019 Alfonso D.M.
1912011 Andhika Setiawan
1912005 Asdar
1912002 Charis Emiliana Miojo
1912036 Elsa Febrianti
1912023 Ferry Ananda Febian
1912033 Ismail Rizky Fahreza
1912040 Jihan Rizky Maulidina
1912030 Juni Susanti
1912035 M. Nur Rifani
1912022 Muhammad Fikri Arrazi
1912018 Muhammad Hariri
1912021 Muhammad Khalid
1912008 Norma Amalia
1912013 Putra Prasetyo
1912015 Raden Chandra Winata
1912009 Randi Baratama
1912012 Rico Andhikaputra Dumanauw
1912048 Sahrun
1912017 Salomo Andred Megri Prawira Olin
1912010 Willson Andrew Susanto Nyo
1912044 Zahra Ananda Saqila Zul Putri
1912024 M. Imam Saputra Subekti
PREFACE
Alhamdulillah, Thank to The Almighty God who has given His blessing to all of us so that we can
continually work creatively. May all works of ours become the good deeds that have been accepted
by Him. Shalawat and salam may always be given to His messenger, Our Prophet Muhammad peace
be upon him, who has guided us from the darkness to brightness.

This Mulia Magazine (Mulia Magz) is one of our creative writing tasks that given to all of the first
semester students of Mulia University. Its name was STIKOMAZINE when this educational
institution was still STMIK-STIKOM Balikpapan. It is the first edition of Mulia Magz after STMIK-
STIKOM Balikpapan have merged with ASMI Airlangga Balikpapan and STMIK SPB Samarinda.

We hope that this assignment will give a good impact on learning motivation of our students
especiallly in English writing aspect and inspire all academicians for improving their proficiency in
English.

We would like to express our deepest appreciation to all lecturers and students of this university for
their support and contributions so that this campus magazine can be published on time.

Finally we quoted a wize man's proverb, “A writing composition has more meaning than hundreds
words of speech”.

Balikpapan, September 2019

Advisor
Yamani,S.S.,M.Pd.
TABLE OF CONTENTS
01 PKKMB 2019 At Mulia University

03 How Did UM Start?

05 E - Learning

07 The Importance Of Cyber Security

11 About PAUD UM

13 The Important Role Of Information Technology In The Business World

15 Information Technology In Business Communication

17 Technological Innovation In Indonesian Education

19 Scholarships At Mulia University

21 History UKM Futsal University Mulia

23 Understanding Of E-learning And Its Benefits

25 Introduction To Student Activity Units Mulia Acoustics

27 About Information Technology Majors At Mulia University

29 Benefits Of Information Technology In The Business Field

31 Facilities At UM

33 Profession In Information Technology

35 Introduction Of Technology And Industrial Embracing 4.0 At Mulia University

37 Motherboard Parts

39 Influential Figures In The Development Of Information Technology

41 Technological Developments in The Field of Online SIM Smart Cards

43 Rector UM Cup 2019 : Speech Contest

45 ICSINTESA & SEMINASTIKA 2019

47 NOBLE UNIVERSITY STUDENT FELLOWSHIP


P
K
K
M
B
2019
At

Mulia
University

01 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Mulia University held the c u r r e n t G o v e r n o r o f D K I students held a photo session
PKKMB (Introduction to Jakarta) who initiated the 2015 as memories.
campus life for new students) in school literacy movement. He
2019. Located at the Cheng Ho explained that through the
UM campus the activity began literacy movement, it was
at 07.30 am and the PKKMB actually a small movement, a
lasted for 2 days. movement that he called could
lead the nation and the next
PKKMB 2019 was attended by generation of the nation to a
the chairman of the airlangga better level and standard of
foundation and structural living.
officials Mulia University.
JUNI SUSANTI
This PKKMB activity aims to be “Reading is mandatory, it's not
able to prepare innovative, only important, it's mandatory!
independent and humanist Just as the obligatory prayer,
technopreneur-based human fasting Ramadan and other
resources who are able to compulsory worship. What's
compete at the global level. the proof? The proof is that the
And new students are required first verse of the Quran is about
to get to know, be proud of and reading. About studying!” He
love the campus and faculty as said to motivate new students
a place to them study while at about the importance of
Mulia University. reading.
I hope that the presence of the
PKKMB 2019 on the first day Indonesian literacy father will
was opened by Plt. Rektor UM have a positive impact on the
Ir.Sigit Sigalayan,M.P who also students of Mulia University,
h e l d a m o r n i n g p a r a d e , the importance of reading,
opening ceremony of PKKMB because reading can improve
and the inauguration of new us to hone our ability to get
students at the Cheng Ho UM i n f o r m a t i o n , h o n e
basketball court. understanding, and gain
The activity on the first day of pleasure.
PKKMB was filled with activities
giving material delivered by PKKMB activities on the second
several UM lecturers and day began with a leisurely walk
Balikpapan Police. after the break followed by
giving material by several
There was a surprise for Mulia lecturers. On the sidelines of
University that there was a free time is also filled with
special guest, the father of performances from several
Indonesian literacy, “Drs. Satria groups of new students.
Dharma”. Bapak Satria Dharma At the closing of PKKMB, all of
known as one of the initiators Mulia University's academics
of school literacy because he is s a i d " We l c o m e t o M u l i a
one of the people together University to New Students at
Ahmad Rizali, Sudirman Said, the Cheng-ho Campus and
dan Anies Baswedan (The W h i t e C a m p u s " a n d t h e

02 The Excellent Study In Mulia University | TI1A | September 2019 Edition


How did UM start?

03 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Airlangga Foundation in 2015, Samarinda. These 3 PTS which technopreneur .
Mr. Agung Sakti Pribadi plans we merged into one and We make young entrepreneurs
to build a university. By changed its name to Mulia as young as possible where
combining STMIK Balikpapan University. young people can reach or
with ASMI Airlangga. encompass globally
Coincidentally the Ristekdikti Are there any obstacles during internationally. Now that
included a moratorium on the manufacture of UM? technology is advancing, let's
university needs. Because there The first obstacle when making become young entrepreneurs
is a chance, so we do a merger . the UM is that we do not know who can reach globally and
And at that time, we plan how to make instruments for internationally . Not only
roughly 15 Prodi . licensing. Then the most playing at the local or regional
dominant obstacle is human level, but also at the
Over time, in 2017 , we were resources, especially the international level .
invited to Pimtek. Then there is minimum fulfillment of
pr ogram government of the lecturers, because the lecturer
Ministry, want to strive for the must be S1, S2 with the study
Foundation which has be how program to be proposed. Then
college. And that, as much as with facilities. So the facility
possible together. And, by must already exist.
chance we, the founders of the
Airlangga Foundation also What is the aim of Universitas
have a central business prides Mulia for the slogan "Global
foundation in Samarinda. Technopreneur Campus"?
JIHAN RIZKY M.
Finally in 2017, we plan, we Global Technopreneur. We
change. Previously there were expect the unity of academic
only two universities, STMIK Ba facilities such as Mulia
likpapan and ASMI Airlangga , University to have global
now we add them to STMIK SPB insight in the meaning of

04 The Excellent Study In Mulia University | TI1A | September 2019 Edition


E-Learning

05 The Excellent Study In Mulia University | TI1A | September 2019 Edition


E-learning is a learning system Learning from the sources of: effecting their daily
which uses electronical Ÿ Virtual Classroom commitments.Learning from
i n f o r m a t i o n a n d Ÿ A u d i o a n d V i d e o the sources of:
communication technologies Conferencing Ÿ Self-paced online courses
(ICT's) as a platform for Ÿ Chat Ÿ Discussion forums & groups
teaching and learning Ÿ Webinars Ÿ Message boards
activities. Ÿ Application Sharing
Ÿ Messaging instantly
The Types Of E-learning :
ASYNCHRONOUS
SYNCHRONOUS E- ELEARNING
LEARNING Student directed, self-paced
set time (phone/Internet learning
classroom sessions) Asynchronous eLearning is
Synchronous eLearning is real- pause-and-resume kind of
time learning. In synchronous learning. In this type of
ZAHRA ANANDA
learning, the learners and the eLearning the learner and the
teacher are online and interact teacher cannot be online at
at the same time from different same time. Asynchronous
locations. They deliver and eLearning may use
receive the learning resources technologies such as email,
via mobile, video conference, blogs, discussion forums,
Internet or chat. In this type of e B o o k ' s C D s , DV D s , e t c .
learning the participants can Learners may learn at any time,
share their ideas during the download documents, and
session and interact with each chat with teachers & also with
other and they get detailed co-learners. In fact, many
queries and solutions. learners prefer asynchronous
Synchronous eLearning is instead of synchronous
gaining popularity because of learning because learners can
improved technology and take online courses to learn at
Internet bandwidth their preferable time by not
capabilities.

06 The Excellent Study In Mulia University | TI1A | September 2019 Edition


The Importance of Cyber Security

What is Cyber Security? attention and use cyber Information infrastructure


Cyber security is technology, security in storing, accessing Is a media that plays a role in
processes and practices and retrieving important the continuity of information
designed to protect networks, information. Protecting operations including hardware
computers, programs and data information and data is a and software. Examples are
from attacks, damage or necessity for most companies routers, switches, servers,
unauthorized access. Cyber and government agencies operating systems, databases,
security is also referred to as an around the world because data and websites.
effort to protect information is a valuable asset of a companyŸ Perimeter Defense
from cyber attacks. Cyber and can become a problem Is a media that acts as a
attacks in information later if the data falls into thecomponent of defense in the
operations are all types of hands of unauthorized information infrastructure such
actions that are intentionally persons. as IDS, IPS, and firewalls.
carried out to disrupt Ÿ Network Monitoring
confidentiality (integrity), What elements are there in System
integrity (integrity), and cyber security? Is a media whose role is to
availability (availability) of Ÿ Security policy documents m o n i t o r t h e f e a s i b i l i t y ,
information. Is a standard document used as utilization, and performance of
All companies that transform a reference in carrying out all information infrastructure.
from digital-based data are processes related to
strongly encouraged to pay information security.

07 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Ÿ System Information and Ÿ Cyber War spread through e-mail,
Event Management Is a war that occurs in the suspicious websites, or
Is a media that plays a role in internet world (virtual). The war hardware that is connected to
monitoring various incidents was armed with internet the company's system tools.
on the network including connections and also Viruses that enter will damage
events related to security computers. Activities that existing data in accordance
incidents. occur in cyber war in general with the purpose of making it,
Ÿ Network Security are hacking and anti-hacking some are simply hiding data,
Assessment activities carried out (officially) but some are up to damage or
It is an element of cyber by the state. The goal starts delete it.
security that acts as a control from stealing data to paralyze Ÿ Botnest and Zombie
mechanism and provides the system owned by the Is a computer attack that is
measurement of information enemy country. connected to a centralized
security. Ÿ Cyber Attack network. Common botnets
Ÿ Human resources and Is a type of maneuver used by effects are referred to as
security awareness countries, individuals, groups, zombies because they are
Relating to human resources or organizations that target already under the control of
and its awareness on computer information systems, hackers. Botnets created to
information security. infrastructure, computer steal data will continue to
networks, and / or personal improve their encryption
What are the use of the term computer devices by various capabilities so they are difficult
cyber in Indonesia? means of malicious actions that to detect.
Ÿ Cyber Law usually originate from Ÿ Scareware
It is a legal aspect whose scope anonymous sources that steal, It is a type of scam commonly
covers every aspect relating to change, or destroying targets used by cyber criminals to
individuals or legal subjects determined by hacking outwit device users because of
who use and utilize internet vulnerable systems. its pop-up warning system.
technology that begins when When it is successfully trapped,
online starts and enters the What are the types of cyber ordinary users are directed to
cyber or cyber world. The Cyber attacks in this digital age? take certain actions that
Law umbrella in Indonesia Types of cyber attacks in the ultimately are fraud.
refers to Law Number 11 Year digital age include: Ÿ Cyber Crime
2008 concerning Information Ÿ Denial of Service In simple cyber crime can be
and Electronic Transactions. Is an attack to manipulate the interpreted as any type of
Ÿ Cyber Security system, network, and criminal activity that uses
It is a technology, process and application so that its telematics technology as a
practice designed to protect performance becomes very medium. The forms of cyber
networks, computers, heavy and draining power. crime are various, ranging from
program s and data from When the company's system is 'low tech' such as defamation
attacks, damage or hit by the attack, hackers will through social media to the
unauthorized access. usually demand a ransom if 'high tech' such as credit card
Ÿ Cyber Crime they want to return to its data theft and other customer
Is a crime activity with a original condition. data as happened in Sony's
computer or computer Ÿ Malware and Viruses online game network.
network into a tool, target or Is a malicious program that is
place of crime in cyberspace. deliberately infiltrated, usually

08 The Excellent Study In Mulia University | TI1A | September 2019 Edition


The motives of this cyber crime number of PCs to then act as delicate that his accomplices in
act can also vary, not all of them zombies simultaneously this country could not be
are motivated by hatred or flooding the target site with captured or touched by the law,
seeking profit, but there are fake data requests. even though the security forces
also those who are morally were able to detect them.
motivated. Examples of acts of Because of this large amount of
cyber crime that are morally fake data requests, the target Cyber Security
motivated are those that occur server will run out of resources As per its terminology, cyber
on the Ashley Madison affair and eventually faint. What security is an activity to secure
site, where a person / group of happened to the site owned by telematics resources in order to
hackers managed to break into the Coordinating Ministry for prevent the occurrence of
the site, and take so much data Human Development and cyber crime as explained
of their members, then they Cultural Resources a few days earlier. And like cyber crime,
threatened to publicize who ago, seems to be the result of the spectrum of cyber security
the perpetrators of the affair on this DDoS action. activities is also very broad.
the site if the manager did not At a higher level, the modus A process of improving security
immediately close its services. operandi of cyber crime not (security hardening), generally
And now some data is starting only uses technical includes technical issues, such
to be released to the public, sophistication but also utilizes as security from the network
because the manager still social engineering carried out side, operating system, data
insists that he does not want to by cross-border criminal security and application source
submit to the threat of the organizations. From the results code. Financial and
hacker. of the author's conversation telecommunications
In terms of modus operandi, with one of the practitioners of institutions routinely hire
cyber crime also has a very cyber security, the problem of security consultants to carry
broad spectrum. The simplest losing large amounts of money out 'penetration testing'.
example is done by those who that befell a number of users of Pen Test is conducted to test
are just learning hacking internet banking facilities from the extent to which the system
techniques (script kiddies) by several well-known banks they have can withstand
defacing a website. The level is some time ago is an example. attacks that will exploit the
somewhat above, which is The action was orchestrated in system. Usually the 'pen test' is
more technically complex, for such a neat way, involving a followed by a number of
example with a Distributed number of hackers from recommendations for
Denial of Service (DDoS) attack, various countries, which took improvement in the points of
where the hacker infects a large place in a long time, and so vulnerabilities that are

09 The Excellent Study In Mulia University | TI1A | September 2019 Edition


detected. warfare. Iran some time ago.
But aside from the technical Activities that occur in cyber Security consultant
side, security tightening warfare in general are hacking The security consultant is in
activities must also include and anti-hacking activities charge of providing security
security against threats from carried out 'officially' by the solutions faced by the
internal personnel. There must state. The goal starts from company. The responsibility is
be a number of protocols or stealing data to paralyze the quite extensive. Starting from
SOPs that must be carried out system owned by the enemy finding the most effective way
by the personnel. In fact, it can country. By connecting all over to protect the network,
be said that internal personnel the world through the internet, software, to conduct testing
are the highest security threat America, China, Russia, Iran, and risk analysis. This can be
factor compared to technical North Korea, South Korea, negotiated in the employment
matters. Japan and many other contract.
What was done by Edward European and Middle Eastern Chief information security
Snowden, an NSA employee, countries, every day is involved officer
who stole and leaked data of in cyber war activities. As the name implies, the chief
wiretapping activities Indonesia itself has been information security officer
conducted by the NSA is a involved in 'cyber war’ with (CISO) is the leader who
perfect example. In terms of Malaysia and Australia, when regulates the IT security sector
human resources, cyber relations between countries of a company.
security practitioners can be experienced tension some time Security engineer
grouped into at least 3 groups: ago, but it seems that the 'war' Security engineers are middle-
Ÿ Security Analyst was not sponsored by the state. level employees in charge of
Ÿ Forensic Specialist building and maintaining
Ÿ Hackers / Hackers Like cyber crime, the forms of company security systems.
cyber war search themselves Sometimes, they have to install
Cyber War vary. Ranging from non- firewalls, test security, develop
If conventional physical war technical ones such as automation scripts to track
can be seen in the form of propaganda through social incidents or even test security.
destruction, the killing of a media, in the form of pictures Security architect
number of people and or articles or bullying activities. Security architects are senior
occupation of the territory, Until the extraordinary employees whose job is to
then this cyber warfare is sophisticated such as the implement and oversee the
largely behind the counter and spread of the Stuxnet virus security of a company's
invisible activities. But the released by Israel with the computer network.
potential damage caused by target of crippling the Iranian
this cyber war could be as nuclear reactor, or the event of
dangerous as conventional 'piracy' of American drones by

ANDHIKA SETIAWAN

10 The Excellent Study In Mulia University | TI1A | September 2019 Edition


About PAUD UM

FIKRI ARRAZI

11 The Excellent Study In Mulia University | TI1A | September 2019 Edition


The development of an which was followed by all PAUD Representative of participants
increasingly sophisticated era, Te a c h e r s t h r o u g h o u t from the Al-Muhajirin 002
demands the increasingly Balikpapan. The aim is to school, Dewi Rosita said, this
sophisticated world of provide an understanding that workshop was very useful
education also in shaping a PA U D t e a c h e r s c a n a l s o especially for PAUD teachers
generation of people who are improve their competence in who were young and new.
knowledgeable and teaching and doing business
competent. In response to this, through information Vision
Mulia University held an Early technology / digital learning To be the center of excellence
Childhood Education Meeting systems. Because so far the lack for innovation in Early
(PAUD) at the Mulia University of PAUD teacher's knowledge Childhood Teacher Education
campus. Through the S1 Study about the world of IT. While with conservation perspective
Program of Teachers and PAUD curriculum 13 is already based and international reputation.
at Mulia University, it was on IT. "Alhamdulillah, out of 50 Mission
hoped that it could improve participants, 15 people directly 1. Organizing superior and
the quality of PAUD teachers in registered at Universitas Mulia innovative education to
Balikpapan, especially with IT- for undergraduate teachers prepare educators in the field
based. Given the rapid and PAUD study programs," he of early childhood education
development of information explained. that is conservation-oriented
and communication not only He added, moreover the and internationally reputed.
penetrated the lives of adults, institution was accredited, so it 2. Carrying out studies,
but also has penetrated the was obliged to implement the research, development, and
activities of children's lives and curriculum and master eight training in the field of early
have a significant impact on the national PAUD standards, childhood education that is
sustainability of the learning which were proclaimed based oriented to conservation and
process for children. on Permendikbud No. international reputation.
So it takes a learning process 137/2014 and in which IT was 3. Organizing guidance,
that is integrated with learning b a s e d . " We i n v i t e PA U D assistance, advocacy, and
media based on information teachers in Balikpapan to join professional assistance to the
and communication Universitas Mulia to improve community in the field of early
technology such as that owned their quality and competence, childhood education that is
by Universitas Mulia. so that they become IT-based conservation-oriented.
Secretary of the Teacher Study professional PAUD teachers. 4. Develop networks and
Program and PAUD Mulia Moreover, the average PAUD partnerships at the national,
University, Lisda Hani Gustina teacher in Balikpapan is not yet regional and international
explained, this was a pre- an S1. There are several but not levels with a principle of good
workshop activity which would yet linear with their S1 government in the field of early
later be held on March 23, certificates, "he said. childhood education.

12 The Excellent Study In Mulia University | TI1A | September 2019 Edition


The Important Role of Information
Technology in The Business World

13 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Why is information technology
so influential in the business
world? Of course, because in
the business world a company
needs information technology
to expand its business scope in
cyberspace. The development
of information technology has
now been widely applied to
national and private
companies. Progress in the
field of technology,
information, and computers
supports the development of
internet technology, through
the internet, business people one alternative that is the right role in the business world.
no longer find it difficult to place to be used as a company Information technology can
obtain information to support to meet with people in the determine the competitiveness
their business activities. Things world. Thus the company will and ability of companies to
that used to be costly and take be able to more easily get new improve business performance
a long time can now be customers on the internet, in the future. Information
completed in a short time. many parties who use the technology will also increase
internet as a means for the effectiveness and efficiency
Business people in cyberspace business promotion and to of business people. Not only
certainly are familiar with the attract buyers. Besides the makes it easy, but the
terms e-business and e- internet can also be used for development of information
commerce. E-business is communication media which is technology today is also able to
different from e-commerce, e- very important for business provide opportunities for us to
business itself is a sub-business people. start and develop our business.
that in the process of managing So what are you waiting for,
and business transactions Information on the internet take advantage of your
using an internet network encourages companies to do business opportunity right now
system, so it does not require a product analysis. In Indonesia, because we have facilitated the
lot of employees and also does there are many companies that development of increasingly
not take up much time and really use internet media to run sophisticated technology.
space, this can make business their business, such as
costs can be reduced and more t o k o b a g u s . c o m ,
efficient. While the notion of e- tokopedia.com and so on. This
commerce or also called is of course a very useful
electronic commerce is a information medium for
trading model whose analyzing what needs are
transactions use the internet. widely used by the community
E-commerce is the process of so that companies can develop
selling and buying goods using their production to be useful to
internet media, while the meet people's needs.
method of payment is using e- Therefore, information ASDAR
transfer media. The internet is technology plays an important

14 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Information Technology
In Business Communication

15 The Excellent Study In Mulia University | TI1A | September 2019 Edition


The progress that has been
achieved by humans in the field
of Information and
Communication Technology
(ICT) is something that we
should be grateful for because
these advances will facilitate
humans in doing the work and
tasks that must be done.
However, not all of the
progress achieved has had a
positive impact. Among the
advances that have been
achieved it turns out to have a
negative impact on humans.
Below this will be presented the large companies have the business processes. IT
positive (profit) and negative choice to develop their own department in a company
(loss) impact of the use of private networks. began to be built and was
I n f o r m a t i o n a n d Multinational companies have constantly asked to develop a
Communication Technology been able to coordinate service, develop a system, and
(ICT) in the social, educational, production and marketing with optimize the efficiency of
economic, and government satellite-based communication business based on information
fields. Utilization of technology systems with video- technology. The influence of
in business communicationFor conferencing capabilities, for the usefulness of IT in business
the business world, the purpose of coordinating decision making. Make a
telecommunications networks product development and decision (decision making). The
were initially used as electricity manufacturing design. more experienced in decision
networks, water distribution Small companies are more making, the greater the
and other utility networks. limited in their ability to confidence that will be more
What used to be a cost to run a develop ICT networks oriented towards an action. If
business, is now a source of themselves or to rent, because an entrepreneur is able to take
competitive advantage. ICT of the high costs. This is an a decision within reasonable
services are now used by all economic choice only if the time limits, he may be able to
economic sectors, from mining organization is large enough to take a profitable decision so
and agriculture to financial generate enough traffic to that business opportunities will
services, manufacturing and generate savings. Because of arise at any time.
tourism. This private network this, global companies were
exists in all global industries, the first parties to adopt new
where multinational ICTs. Sectors that rely heavily
companies become on ICT include, among others,
networking companies. Large- financial service companies.
scale business users have the In a broader scope, for example
need for cost-effective, flexible, in the business environment,
secure, automated, integrated the presence of information
and reliable systems. If local technology is starting to be
service providers cannot meet realized can present a variety of
RADEN CHANDRA W.
this need, at a reasonable cost, solutions that can help existing

16 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Technological Innovation in
Indonesian Education

17 The Excellent Study In Mulia University | TI1A | September 2019 Edition


There are still many Information through the including the availability of free
communities in Indonesia internet media, can be one of learning modules, online
where the majority of parents the keys to making the world of learning portals, etc.
are unable to help their education in Indonesia have Technology is a crucial element
children learn. the same standards as other in the process towards
The reason could be because countries. By using internet Education 4.0,teaching staff
they are poorly educated or media, the government and can collaborate better with
rarely at home. Other than that, educational institutions have students through
there are still many teachers begun to apply learning personalization. This makes the
whose teaching abilities are patterns that are effective teaching staff can manage the
doubtful, as indicated that enough to be applied to devices in the classroom and
more than half of them did not people who have problems plan study plans that will
pass the teacher competency with distance and time to get provide better learning
test. information, especially outcomes. Personalization
As a result, many Indonesian information in the world of through a device enables
children get low quality education. optimal utilization of
teaching and education. So One method that has begun to technology and empowers
that the ability to read, count, be applied is distance learning. students in their learning
and science knowledge of Distance learning method is an process. One of them is with
Indonesian children is under alternative method in equal augmented reality (AR) and
Singapore, Vietnam, Malaysia, distribution of opportunities in virtual reality (VR), both of
and Thailand based on the education.This system is these tools can improve the
2016 PISA (The Program for expected to be able to quality of teaching and
International Student overcome some of the learning process when
Assessment). problems caused by the students face assignment-
limitations of qualified based learning. VR is
One area of digital technology teaching staff. Distance implemented virtually, with
that can provide solutions to learning method is very helpful limited stimulation from the
community problems is in the for students or the public in real world. While AR is carried
education sector. learning things or new sciences out directly but is
Technology-based education with a view that is more complemented by digital
in Indonesia can utilize interesting and easier to elements.
technological developments to understand.
provide education for students In accessing and utilizing this
in remote areas with low method,the role of the internet
populations, including Eastern is very necessary, because
Indonesia. When viewed at this through the internet one can
time the development of send files or upload files that
information technology in want to be published and
Indonesia is growing. With the through the internet also
existence of information someone can access the files
technology can make it easier you want to find. In addition to
CHARIS MIOJO
for us to learn and get the distance learning methods,
information we need from there are still many other
anywhere, anytime, and from methods that are very helpful
anyone. in improving the quality of
education in Indonesia,

18 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Scholarships at
Mulia University

19 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Often we hear, what does this
scholarship mean? Let us all not
misunderstand, let's look at the
explanation first! Scholarships
are gifts in the form of financial
assistance given to individuals
who aim to be used for the
continuity of the education
being pursued.

Scholarships can be given by


government institutions,
companies or foundations.
At Mulia University itself, there
are many Scholarship options
that you can try. Not bad for Anggana District, Muara Badak Indonesian Education
adding pocket money! District, Muara Jawa District, Scholarship, hereinafter
Samboja District, and abbreviated as BPI, is a
1. Bidikmisi Scholarship S a n g a s a n g a D i s t r i c t t o scholarship program
Bidikmisi Scholarship is a participate in the selection of organized by the Government
tuition assistance from the t h e P T P e r t a m i n a H u l u of Indonesia through LPDP,
government of the Republic of M a h a k a m S c h o l a r s h i p Ministry of Finance of the
I n d o n e s i a t h r o u g h t h e Program. Republic of Indonesia in the
Directorate General of Higher 4 . R I S P R O B A T C H context of financing education
E d u c a t i o n , M i n i s t r y o f SCHOLARSHIP in the country or abroad.
Education and Culture for P r o d u c t i v e I n n o v a t i v e How to, You're all interested in
prospective students who are Research Funding (RISPRO) is a continuing your study at
economically incapable and research funding program Universitas Mulia Balikpapan.
have academic potential, both both competitive and initiative So we don't need to go far
to study in tertiary institutions a i m e d a t e n h a n c i n g t h e outside of Kalimantan Island
in superior study programs competitiveness of the nation now, because now in our place
until graduating right time. through product / technology there are also many superior
2. Kaltim Cemerlang commercialization or universities that are ready to
Scholarship implementation of policies / compete both regionally and
Kaltim Cemerlang Scholarship governance or publication. internationally.
is a scholarship from the 5 . E a s t K a l i m a n t a n Greetings Mulia and Jaya
G o v e r n m e n t o f E a s t Scholar ships Completed
K a l i m a n t a n i n t e n d e d f o r scholarships provided for
s t u d e n t s , s t u d e n t s , a n d children from East Kalimantan,
lecturers, especially those from especially for those who are
East Kalimantan. unable and have talent and
3. Mahakam Scholarship achievements.
The SKK Migas Mahakam Then, thousands of stimulant
Scholarship and PT Pertamina scholarships for education and
Hulu Mahakam (PHM) provide even doctoral degrees.
opportunities for outstanding 6. INDONESIAN EDUCATION
students in five regions such as SCHOLARSHIP LPDP FERRY ANANDA F.

20 The Excellent Study In Mulia University | TI1A | September 2019 Edition


History UKM Futsal
University Mulia

21 The Excellent Study In Mulia University | TI1A | September 2019 Edition


The establishment of Futsal
UKM at Mulia University was
formed in 2012, which was
fostered by M. NURFALAH. S,
S.KOM ,. MT. Futsal UKM is
much favored by students at
the University of Mulia,
especially men, and often
follows many league
tournaments. M. NURFALAH. S,
KOM ,. MT has served as a
mentor of Mulia University
Futsal UKM from 2012 until
now. Futsal UKM at Mulia
University conducts training
every Saturday and Sunday at
the BSC (Baokasilikpapan Sport
Center).

Mulia University took part in


the Inter-Province Tournament
and had won 3 times. During
the Tournament in Jogja,
Universitas Mulia won 2nd
place among the proventions.
On September 27, 2018,
Universitas Mulia students
took part in the Kalimantan
a r c h i p e l a g o l e a g u e At the moment the coach is
tournament on behalf of selecting talented players for
Moehammad Rizal with NIM the upcoming matches.
15.01.303. thumbs up for Futsal
UKM. In 2019, the chairman of
Futsal UKM was Syahrul Fathul
Hikmah and his Vice Chairman
was Muhammad Ali Husain.

The chairman of futsal plans to


take part in a match between
students at STT Migas. But M.
NURFALAH. S, KOM ,. MT did
MUHAMMAD HARIRI
not approve because
previously there had been an
accident from one of Mulia
University Students. Which is
also where the field conditions
are not feasible.

22 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Understanding of E-Learning
and Its Benefits

23 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Understanding E-Learning
E-learning is a system or
concept of education that
utilizes information technology
in teaching and learning. Here
are some definitions of E-
learning from various sources:
1.Learning is arranged with the
aim of using an electronic or
computer system so that it can
support the learning process
(Michael, 2013: 27).
2.The distance learning process
by combining principles in the
learning process with
technology (Chandrawati,
2010).
3.The learning system used as a
means for teaching and
learning process carried out
without having to face to face
directly between teachers and
students (Ardiansyah, 2013). schedule, curriculum, learning 5.Improve students'
progress results, and matters independent learning ability.
Characteristics of E-learning r e l a t i n g t o e d u c a t i o n 6.Improve the ability to display
According to Rosenberg (2001) administration can be seen at information with information
t h e c h a r a c t e r i s t i c s o f E - any time on the computer technology devices, which with
learning are networked, which ordinary devices is difficult.
m a k e s i t a b l e t o q u i c k l y Benefits of E-learning 7.The use of E-learning to
improve, store or bring back, 1.Flexible. E-learning gives support the implementation of
distribute, and share learning flexibility in choosing the time the learning process can
and information. and place to access trips. increase students' absorption
Characteristics of E-learning 2.Learn to be independent. E- of the material being taught.
according to Nursalam (2008: l e a r n i n g p r o v i d e s a n
135) are: opportunity for learners to
1 . U t i l i z i n g e l e c t r o n i c independently control the
technology services. success of learning.
2.Utilize the advantages of 3.Cost Efficiency. E-learning
computers (digital media and provides cost efficiency for
computer networks) administrators, the efficiency
3.Using teaching materials that of providing physical facilities
are independent (self learning and facilities for learning and
materials) and then stored on a cost efficiency for students is
IMAM SAHPUTRA
computer, so it can be accessed the cost of transportation and
b y d o e s e n a n d s t u d e n t s accommodation.
anytime and anywhere. 4.Increase the active
4 . U t i l i z i n g t h e l e a r n i n g participation of students.

24 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Introduction to Student
Activity Units Mulia Acoustics

25 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Music is sound that is
composed in such a way that it
contains rhythm, song, and
harmony, especially sound 1. Mrs. Baldwine Honest University or outside.
produced from instruments 2. Mrs. Wurry and 3. Introducing music UKM to
that can produce rhythm. Of 3. Mrs. Citra the people of Balikpapan, by
course, students at Mulia And in this UKM has 6 presenting their talents and
University did not miss it by structures including; various members.
forming UKM Mulia acoustics. Chairperson, Deputy 4. Procurement of UKM shirts,
The aim why UKM Mulia Chairperson, Secretary, programs that plan, design and
acoustic is formed, so that Treasurer, Public Relations distribute T-shirts specifically
students can develop the Section, and Training Section. for UKM members for a period.
potential interests and talents Uniquely, this UKM does not The objective to be achieved by
of students. As well as learning interfere with lectures, why? arranging the work program of
the instrument itself. What Because the practice is enough this UKM is none other, so that
musical instruments are there on weekends, which is a productive UKM is formed
at UKM Mulia acoustics? For Saturday afternoon at 16.00 which contains talented people
now, you will be taught how to pm, so it does not interfere with in the music field. And also in
play the keyboard, guitar and the lecture schedule, and it can the future UKM Muliaacoustic
cajon. still be a weekly night, guys. is not only known on campus
but also outside campus.
And don't forget to also The work program is divided
practice vocals, so that you into 4 namely:
learn to sing according to the 1. Routine training, this activity
key, improve your is carried out so that students
pronunciation, learn to can quickly obtain, understand,
harmonize, find your vocal develop, and then practice.
range, expand your repertoire, 2. Participating in every event
and learn to improvise. or public activity, intending to
This Mulia acoustics has 4 participate in events and
supervisors namely: activities held at Mulia NORMA AMALIA

26 The Excellent Study In Mulia University | TI1A | September 2019 Edition


About Information Technology
Majors At Mulia University

27 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Learn and apply the principles
of computer science and
mathematical analysis for the
design, development, testing, 2. Business Information
and evaluation of software, Technology
operating systems and In the industrial era 4.0
computer work. students are required to program students will take
One of the study programs update about technological C I S C O a n d M I K R O T I K
found in the Mulia University's developments where today all certificates.
computer science faculty is are based online and digital.
information technology which
has two concentrations Although this study program
namely: leads to computer network
1. Forensic And Security security hardware and find or
Network Architecture restore data that has been lost,
This concentration teaches the study program students are
about how to restore or find still required to master the
lost data and information both programming language,
from the hard disk or flash because the faculty of
PUTRA PRASETYO
partition and other storage computer science must be able
media. Looking for facts to make software or
hardware and software must application programs.
also be mastered by IT study All students are also required
program students both to be able to master English
computers and networks. where English is an
international language that is
This concentration also useful for communicating and
discusses computer and also for computer work
network security from both programs.
software and hardware For certification in this
security. information technology study

28 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Benefits of Information Technology
in the Business Field

29 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Nowadays information
technology is not only
developing rapidly, but also
often undergoing very rapid
changes. Almost every second
new discoveries are always
found with the aim of
improving or perfecting the
results of previous technology.
the benefits of information
technology at this time are not
only used for the benefit of the
organization, but also for and information will encourage conduct teleconferences to
individual needs. For some people to create some communicate with each other
information technology very profitable opportunities about several ideas. This makes
organizations can be used to and as a very profitable meetings more practical and
achieve competitive business capital. An example of can also supervise the
advantage, while for individual using technology and performance of employees.
needs, technology is used for communication advances is 4). Access to information and
personal interests such as Google. Where the google dissemination of information,
looking for work. search engine is widely used to publishing news through the
With the rapid advancement of search for something on the internet can be widely spread
technology today, it can be said internet and the google quickly compared to using fax
that information technology company will get many o r p o s t . We c a n s p r e a d
has entered into all fields, one benefits. information throughout the
of which is in business. 2). Reducing production and world and can interact directly
Businesses without utilizing operational costs, advances in through computers.
information technology will technology and information 5). Fast communication, many
not be able to progress and are can help companies reduce existing facilities on the
threatened with bankruptcy. production costs so that the internet prove the speed of
Many business people who use company will get a large profit communicating with the
information technology to by spending a small intended person, such as e-
support business progress and expenditure. and reduce mail that has been widely used
get the desired benefits. operations so that the to send and receive
company can increase the documents. Chat or video
Utilizing information amount of production in each conferencing also speeds up
technology in the business field of its production goods. communication.
will have a big positive impact 3). Simplify the process of
on the business network that communication and
we build. Here are some monitoring of each employee,
important benefits of simplify the process of
information technology in the communication and
business field: monitoring of each employee
1). The emergence of new who works, so that employees
business opportunities (E- do not have to bother coming
business), with the to the meeting room and
advancement of technology gathering together, and can RANDI BARATAMA

30 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Facilities at UM

CAMPUS BUILDING
The campus building functions
as a forum for student
activities/activities which
include Teaching, Research and
community service activities.
the main function is as a
container of teaching and
learning activities that require
space that can accommodate
activities well.

ISMAIL RIZKY F.

31 The Excellent Study In Mulia University | TI1A | September 2019 Edition


LIBRARY With extracurricular activities, it stretches the muscles in the
The UM campus is well aware w i l l i n c r e a s e t h e body so the brain becomes
that the library is one of the closeness/familiarity between fresh and smooth in thinking
most important facilities. classes and even all school and memorizing lessons
Therefore, the library is in every residents and build positive because our brain fresses
faculty in UM. Each library in competition in sports through without stress, of course, it
UM provides a diverse competition in the field, must be with a good pitch first
collection of books needed by academic learning activities in to attract the interests of
students or lecturers who are the classroom are very school/campus residents to
certainly related to the field of important, but with the exercise.
science in each faculty. presence of the field and
PARKING LOT additional extracurricular GAZEBO
UM provides ample and safe activities, this will explore talent Gazebo is a place to sit inside
parking space that can also be to several students. UM campus area
used for sports, extracurricular Improve the image of This place is for all students and
activities and other activities school/campus. Having your lecturers to be a place to
that require large spaces. own sports field makes our unwind and is also used as a
CHENG HO CLASS school a favorite school with a place of learning for students in
UM, Hall / Hall can level higher than schools that their spare time. This gazebo is
accommodate 300-400 do not yet have a field, in most considered effective because
participants in events held in schools both in cities and its position is wide enough also
the campus environment such villages now have a sports field has a nice seat.
a s S e m i n a r s , Wo r k s h o p s , is an obligation because there Besides, the presence of wifi
Trainings, Extra-curricular are many benefits to be gained facilitates making students feel
Activities and others. from sports activities in the comfortable in terms of
field, besides that a good learning, as a place to share
CANTEEN sports field next to or in front of experiences and knowledge
Canteen has many benefits, the school can invite the with fellow students also easier
among others. In addition to a attention of guests/anyone to access assignments.
place to buy food and drinks, who passes by, and of course The existence of a fountain
the canteen can be made a this is a positive value of beside the gazebo is also one
place to gather with friends yourself. Health is always of the fatigue-relieving factors
during recess. So the creation maintained and not easily hurt during the teaching-learning
of a sense of kinship between Having a good sports field process in class from morning
campus residents, for example, contains all the people who are to evening. This gazebo is used
fellow students, fellow passionate in exercising and as a second place to study
lecturers, even students and many benefits in sports such as besides the classroom.
lecturers. By inviting dinner increasing endurance, LAB
together in the canteen, it can increasing endurance, of The Faculty of Communication
also strengthen the course if exercise is carried out has several laboratories that
relationship and even routinely and if the immune are used both by the Industrial
relationships among campus system is awake then the body Engineering Study Program
residents. is not easily attacked by and the Informatics
SPORTS FIELDS (Basketball, diseases and not easily weak Engineering. Computer
Volleyball, Badminton, and when doing work and teaching Network Laboratory is a
Table tennis) and learning activities. Avoid laboratory used by the
Have additional extracurricular stress by exercising we reduce Informatics Engineering Study
activities in the field of sports stress because exercise Program.

32 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Profession in information technology

1. Database Administration we must have skill related with language so can communicate
If you like jobs like database , system security , get used with with engineer in mobile or web
you will like this job because it linux and can config server , get 4. Network Engineer
have responsibility to define used tools pentest like Someone who has the duty to
pattern database structure , Netsparker , Acunetix , Kali take care of computer /
define storage structure and Linux, Wireshark. telecommunications networks
methode access , and give 3.System Analyst in an organization that is
permission to user to access System Analyst usually called managed can function well, is
data , skill you must have like analysis which has stable, can be accessed / used
few DBMS ( Database responsibility to define the user by users. Network Engineer has
Management System ) need, arrange solution the responsibility of designing
according to the needs like effective and and oversee the and building network
Microsoft Access , SQL Server , initial transition to system use. infrastructure both LAN and
Foxpro , Oracle DBMS , The system analyst can also be WAN, providing the best
Paradox. an intermediary or liaison solution in terms of network
2.Security Engineer between the software sales infrastructure both in terms of
If company got bigger the company with the organization equipment used, efficiency,
company need one who where it works, and is reliability, security and other
troubleshooting security , responsible for analyzing related aspects. A Network
network , system , application , development costs, design and Engineer has a salary of around
become security engineer development proposals, and 3.2 million per month
make sure everything is going determining the time span 5. System support / Technical
well and doing some things like needed , to be system analyst support
firewall configuration , doing can show result analysis System Support / Technical
pentest , updating security and through various kinds like Support has daily work to
guarding so hacker cant attack Microsoft Excel , Visio , and be support / maintain / maintain a
so company don't get loss , so able to using programming computer system in the form of

33 The Excellent Study In Mulia University | TI1A | September 2019 Edition


hardware or software that is analytical skills. 11. UI / UX Designer
already running. A System 8. RSS (Radio Subsystem) UI is how a product that we
Support has the responsibility Engineer make looks like what can be
of maintaining and ensuring This person is responsible for seen by the eye. The main
that the existing system runs the Radio device: BTS, BSC. purpose of the UI is to display
well, troubleshooting and node B GSM / UMTS operation interfaces that have good
repairing the system and (usually requires special uniformity in terms of color,
providing training to system training from device vendors), layout, or font. Meanwhile UX is
users. To become a System skilled in operating vendor a process to make products
Support / Technical Support we devices used (Ericsson / that we have made easy to use
will get an average salary of 2 Siemens / Nokia / Huawei, etc.), and do not confuse users. The
million / month for fresh if the device uses IT technology responsibility of a UX designer
graduates (oracle database, solaris, linux, is to ensure that every step by
6. NSS (Network Subsystem) etc.) it would be better if the step goes logically and clearly.
Engineer person concerned has the To become a UI / UX designer
This person is often called a certification. we must be accustomed to
core-network engineer. This 9. System Administrator choosing a combination of
person is responsible for the Someone whose job is colors that are comfortable for
core network device: MSC. HLR, responsible for maintaining the the user and must be detailed
HSS GSM / UMTS operation configuration and security of to see results marketed to the
(usually requires special the operating system of a production both in terms of
training from device vendors), computer, especially multi- fonts, colors, images.
skilled in operating vendor user computers such as server
devices used (ericsson / c o m p u t e r s . To b e c o m e a
siemens / nokia / huawei, etc.), System Administrator, we must
if the device uses IT technology have basic knowledge about all
(oracle database, solaris, linux, aspects of Linux or Unix such as
etc.) would be better if the Solaris or BSD
person concerned had the 10. Pentester
certification. Penetration testing or often
7. Network planning / abbreviated as pentest is a term
Optimization for testing the reliability of a
WILLSON ANDREW
This person is in charge of system and documenting the
planning the network (e.g. level of security of applications,
determining whether it is computer systems, or
necessary to add new BTS). networks. According to one of
optimizing (e.g. tunung the pentesting service
parameters so that the quality providers namely Ethic Ninja
of the sugnal is good). they also they use 2 methods including
took data from the drive-test B l a c b o x Te s t i n g w h i c h i s
for further analysis. This person penetrating without knowing
needs to understand the GSM / anything about the system you
UMTS fundamentals. are using besides your
understand using the tools application domain and
used (e.g. TEMS, mapinfo, Whitebox Testing which is
planning), understand the penetrating by knowing
parameters used in information about the system.
optimization, have good

34 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Introduction of Technology and Industrial
Embracing 4.0 at Mulia University

35 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Taking a role in the Industrial characteristics of jobs that exist
Age, Mulia Uiversity held an today, where skills and
introduction to Technology competencies are the main
and Industry Embracing 4.0 things that need attention.
Thursday (8/8/2019) Faculty of Therefore, Mulia University
Business Economics (FEB) & began to introduce the
Faculty of Humanities and Industrial Revolution 4.0 which
Health (FHK) Mulia University would bring many changes
Held a Meeting that discussed with all the consequences.
"Introduction to Technology & Starting from introducing
Embracing Industry 4.0" which technology to embracing the
took place in the Executive Industrial Revolution 4.0. So
Room of the Mulia Campus that the importance of
White Campus. universities is actively involved
in preparing reliable human
What exactly is Industry 4.0? resources, because the
and why do we have to take a development of industrial
role in Industrial Age 4.0? dynamics from 1.0 to 4.0 is the
In short, understanding inevitable will of the times. The
industry 4.0 is a trend in the education system, has an
industrial world that combines important role so that human
automation technology with resources, especially from
cyber technology. Spurred with universities, are not only able to
the slogan of the University of adapt to the times.
M u l i a " Te c h n o p r e n e u r
Campus", therefore Universitas
Mulia strived to create
innovations that could be
outlined in the Mission of the
University of Mulia in the
Industrial Revolution Era 4.0.
The rapid development of
technology in the industrial
revolution era 4.0 is very
ELSA FEBRIANTI
influential on the

36 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Motherboard Parts

37 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Motherboard or also
Motherboard is the main the
part of a PC, because it is on the
motherboard that all
components of your PC will be
installed, such as processor or
RAM. The shape of the main
Board is the like an electronic
circuit board. The motherboard
is a place for data to pass,
because the computer
equipment and makes it work
together so that the computer
runs smoothly.

Motherboard Components : 3.Memory Socked (RAM) source. In 6-channel mode, this


1.Power Connector There are two types of the jack function becomes bass /
Power connector is a plug pin memory sockets that are now center. This line out(lime) jack
that connects the motherboard circulating in the computer connect to headphones or
to the power supply or society. There is also a news speakers. In the 6channel
commonly called the PSU that socket for Rambus-DRAM, but mode, the function of this jack
is on the casing of the until now not many users have is to be the front speaker out.
c o m p u t e r . O n AT t y p e used it. Old socket that is still 7.Video Graphics Por t
motherboards, the casing quite popular is SIMM. Socket Adapter end USB 2.0 Port 3
needed is AT type too. AT type is composed of 72-pin end Port 4
power connector consists of modules. The second socket This 15-pin port is an output
two parts, where two cables has 168 pin modules, which are port for VGA monitors or other
from the power supply will be designed in one direction. It is compatible VGA devices such
stuck there. While on the ATX not possible to install it upside as LCD Projector.
type, the power cable is down, because the groove on
integrated in one header intact, the motherboard has been
so you just plug it in the adapted to a DIMM type
motherboard. There are several memory socket.
motherboard that provide two 4.PCI Slots
types of power connectors, AT This 32-bit PCI 2.2 slot
and ATX. development supports PCI
2.Socked or Processor Slot master bus cards such as SCSI
Socked is a processor cradle on or LAN carts with a maximum
the motherboard. This holder is output of 133MB/s.
5.RJ-45 Port KHALID WALLS
rectangular with small holes
where the legs of the processor This 25-pin port connects LAN
are arranged to form a 2- connectors through a central
dimensional distance between network. Usually located
the holes are exactly the same behind the CPU.
as the layout, location and 6.Line In, Line Out
distance between the pins of Jack line in (light blue) connects
the processor. tithe tape player or other audio

38 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Influential Figures In The Development
Of Information Technology

1. Daugles Englebart technology, especially in the


You might feel strange when field of video games, where he
you hear the name, but the once created the first cartridge-
discovery and service is actually based video game system, The
very big you know for the world Fairchild Channel F. Because his
of technology, even now you services also don't necessarily
will still use it. Dr. Douglas C have to co-exist with hardware
Engelbart is the inventor of the anymore, more and more
mouse or mouse that you developers games and
normally use to control a PC or software companies are
laptop. I can't imagine what starting to come up with
would happen if Douglas didn't brilliant game ideas.
find the mouse.
4. Martin Cooper
2. Norman Abramson he most influential person in
Today's young people need to the next technology world is
thank this bald-headed man. Martin Cooper. If there is no
Because, without Norman him, the world would do not
Abramson's services there is no need to be complicated if you
such thing as wireless LAN or want to preach something. You
WiFi technology that you don't need to wait long for the
normally use to surf the dove to send a longing
internet. Norman first created message to your sweetheart,
ALOHAnet, the first wireless because Martin Cooper
local area network that he managed to find his first cell
designed and developed at the phone.
University of Hawaii. In fact
ALOHAnet is said to be the first 5. TimBeners-Lee
to successfully transmit data born June 8, 1955, London,
using radio signals. England, Tim Berners-Lee is the
inventor of WWW or the World
3. Gerald Anderson Lawson Wide Web, with his biggest
Gerald is a very influential contribution in advancing the
person in the world of Wo r l d W i d e We b i s n o t

39 The Excellent Study In Mulia University | TI1A | September 2019 Edition


patenting it so you can use it successfully released a very Android, and even Mac OS.
freely until now. Try if there isn't successful operating system on
him, your world won't be as the world market. However, Bill 10. Larry Page
wide as now. The inventor of Gates also received an award All that can not be separated
the World Wide Web and one that was not good in his career. from the role of a reliable
of Time Magazine's 100 Most Not just once, he even did computer programmer named
I m p o r t a n t Pe o p l e ' s 2 0 t h several times in the software Lawrence Edward Page aka
Century Magazine, Sir Tim business. L a r r y Pa g e w h o f o u n d e d
Berners-Lee is a scientist and Google together with his
academic whose visionary and 8. Stave Jobs partner, Sergey Brin. Since
innovative work has changed Not foolish if you do not put childhood, Page was familiar
almost every aspect of our lives. Steve Jobs into the list of the with computers because his
most influential people in the parents who worked could not
6. Fujio Masuoka world of technology. This be separated from the
Imagine, from his dream in business figure and inventor computer. He claimed to have
1980 to develop and perfect from the United States was the been interested in computers
nonvolatile memory chips to co-founder, chairman and since he was 6 years old and
store data. Four years later, in former CEO of Apple Inc., had studied them. Until
1984, Masuoka succeeded in before he died and was graduate school, Page along
creating NOR Flash Memory replaced by Tim Cook. Just so with Brin refined the search
while working on Toshiba. The you know, Steve Jobs had engine that was introduced in
four Megabit NAND-type Flash previously served as an 1998. Google also grew into a
Memory was formalized at the executive at Pixar Animation company that has many
I n t e r n a t i o n a l S o l i d - St a t e Studios, then became one of internet services.
Circuits Conference in 1989, the boards of directors of The
which later became the Walt Disney Company in 2006.
forerunner to the emergence of Even the Toy Story film that
memory cards with various exploded in 1995 was the
levels of storage that we brainchild of his then serving as
normally use to store photos, executive producer .
songs, and so on.
9. Kenneth Thompson
7. Bill Gates Kennet Thopson or commonly
Who doesn't know Bill Gates? called Ken was a computer RICO ANDHIKA
The figure who is often referred scientist with his masterpieces
to as the number one richest in developing the Unix
person in the world is also operating system, in 1969 while
among the most influential still working at Bell Labs. At that
people in the universe of time, Ken succeeded in
technology, especially after he developing the B programming
founded Microsoft as the language which became the
forerunner of today's modern forerunner to the C
computers. Through his hard programming language which
work, the company he founded is now the most commonly
called Microsoft Corporation used in the world. UNIX itself is
became successful and Bill the first step of a well-known
Gates soared to become a operating system that we
millionaire. In 1990 Bill Gates currently use such as Linux,

40 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Technological Developments in The
Field of Online SIM Smart Cards

41 The Excellent Study In Mulia University | TI1A | September 2019 Edition


A driving license (SIM) has a one, that is very important is
broader meaning and function how we record the behavior of
for its owner, not just as a the driver, when the driver
mandatory instrument before commits a traffic violation that
driving. A new breakthrough is recorded on the chip card
was made by the National and our server," Refdi said after
Police in this case the Traffic the launch event. Then
Corps (Korlantas), by issuing furthermore we can find out the
Smart SIM. Especially with the police forensics related to the
emergence of Smart SIM, this driver. Other data that will be
M. NUR RIFANI
card has become an important contained in the Smart SIM is
tool because it is able to store the track record of the accident
violation data so it can be used experienced by the user. He
as a transaction tool for emphasized, SIM is basically a
payment. National Police Head form of driver legitimacy. Thus,
of Traffic Police Inspector the driver's track record
General Refdi Andri said, SIM is recorded in the Smart SIM chip
proof of the legitimacy of will be evaluated. In addition,
competence, control tools, and the Smart SIM can also function
police forensic data as electronic money to pay for
parking, tolls, and shopping.
The Smart SMART SIM or SIM The owner can fill a maximum
SIM was launched by the balance of Rp. 2 million. Not
National Police Traffic Corps only that, in the video
(Korlantas), to coincide with the presentation at launch, Smart
64th anniversary of SIM also presents an
Bhayangkara Traffic Day, which augmented reality feature that
was held at the Bung Karno users can use to access traffic
Basketball Hall, Jakarta, Sunday safety education services.
(9/22/2019). This chip-
equipped SIM has a number of Now with the development of
advantages over the previous information technology,
SIM, such as recording driver making SIMs has adopted an
violation data to electronic online system. The applicant
money. does not even need to come
early to queue to make a SIM.
The advantages of Smart sim This makes it very easy for
cards Online applicants who have limited
Excellence of the Head of Traffic time. Online SIM registration
Corps (Korlantas) National can be done via the website, by
Police Inspector General Refdi opening a smartphone, or can
Andri revealed there are several also come directly to the SIM
main advantages of Smart SIM. Satpas (Administrative
First, Smart SIM records the Organizer Unit). However, with
driver's forensic data. Then, an integrated online system,
violations committed by the registration can be done at any
driver are also recorded in the time through internet
Smart SIM. "The advantage, connected media.

42 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Rector UM Cup 2019 :
Speech Contest

43 The Excellent Study In Mulia University | TI1A | September 2019 Edition


UM Rector Cup is a
competition activity held by
Universitas Mulia every year
and competitions that are
competed include Futsal,
Badminton, Volleyball, Table
Tennis, Basketball, Speech
C o n t e s t , C a m p u s
Ambassadors, Short Movies,
Robotics, Websites, Network
Security, Graphic Design,
Android, and Photos video
Selfie.And from the
competition above, there is a
speech contest and what is the
speech contest (Pro) / not support (Kontra).
At the time of the match 6
What Is Speech Contest ? people who competed they
Often we hear the word speech, could not be present because
especially for those of us who there were busy each one there
are daily in the world of working, thesis, and others.
education, usually every year and for this year the winner is
after completing the school 1. Ariske Nurul
exam, all kinds of competitions 2. Ma'ruf Hanafi
will be held, one of which is the 3. Larasati ALFONSO
speech contest. and the winner gets the
Speech in Indonesian means Champion
“Pidato” and Contest means is 1. 2.5 million
“Perlombaan” , so it can be 2. 1.5 million
interpreted Speech Contest in 3. 1 million
Indonesian is “Perlombaan
Pidato”. For this year all UM What Is the Target For UM?
students can participate from for the purpose of this UM itself
the class of 2015 to 2019 and is actually for coaching to build
there are 20 people registering students to be more confident,
the contest. and this year 2019 actually from this UM students
speech contest takes the topic themselves many are good and
of cyberbully in school, 1 capable in English but few of
month before the UM meet for them are confident, hopefully
technical meeting and explains with contests like this students
rules, requirements, can compete and know until
assessments, and topics. of the their abilities and in the future
9 people who attended the we will try to be open, so that
technical meeting was finally competing not only UM
decided to take the topic expel students from outside can also
cyberbully in school and the participate, said Mr. Yamani
topic is allowed to support

44 The Excellent Study In Mulia University | TI1A | September 2019 Edition


ICSINTESA & SEMINASTIKA 2019

45 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Universitas Mulia (UM Creative Applications" This seminar Keynote Speech. Referring to
Media) - Universitas Mulia held presented the Keynote Speaker the concept of education 4.0 to
a seminar entitled International / Speaker Dr. Valentine J anticipate the occurrence of
and National. After making Ghandi (Niras Data Futures technological disruption,
lengthy preparations to hold Hub United Kingdom), and known as the industrial
the International Conference of Assoc. Prof. Dr. Massila, M.Sc revolution 4.0, educational
Science and Information (UTeM Malaysia) and Bpk. The institutions are expected to
Te c h n o l o g y i n S m a r t Governor of East Kalimantan, make changes. With the
Administration (ICSINTESA) represented by the Acting holding of this seminar to
and the National Seminar on Assistant, East Kalimantan equip students who attended
Information & Communication Provincial Secretary and Public the seminar the importance of
T e c h n o l o g y a n d Welfare Assistant, Moh Jauhar actively exploring various
Administration (SEMINASTIKA) Efendi.Through this discussion learning resources that are very
this seminar event was officially forum, the Governor of East abundant in cyberspace.
held.Wednesday (10/16/2019) Kalimantan invited the
ICSINTESA and SEMINASTIKA community to make the best
were held at the Grand Jatra use of technology.
Hotel in Balikpapan. ICSINTESA
& SEMINASTIKA was opened "It's no wonder kids today are
by the Rector of Mulia faster and more proficient in
University, Agung Sakti Pribadi, utilizing technology than we
SH, MH. are. Likewise, the concept of
school / education for them
"The first international seminar must also be different from the
SAHRUN
held by Universitas Mulia and current school / education
even in Balikpapan will become method, "said the Governor of
a reference for technological East Kalimantan, Isran Noor
developments to face the era of through Acting, Assistant
the Industrial Revolution 4.0," Government and East
said Agung Sakti Pribadi. Kalimantan Provincial
Themed "Embracing Industry Secretariat, Moh farar Efendi in
4.0: Towards Sustainable Smart English when he became

46 The Excellent Study In Mulia University | TI1A | September 2019 Edition


NOBLE UNIVERSITY STUDENT FELLOWSHIP

47 The Excellent Study In Mulia University | TI1A | September 2019 Edition


Indonesia since ancestral times God must be able to challenge and prosperous Indonesia. The
has inherited the spirit of and set an example, uphold event was attended by more
diversity or diversity. The diversity, anti-discrimination, than 300 representatives of
concept of Unity in Diversity, and antiradicalism. PMK throughout Indonesia,
which is extracted from the where representatives from
Book of Sutasoma by Mpu In this perspective and attitude, ITB, UPI, UGM, IPB, UNPAD,
Tantular, clearly explains the the Christian Higher Education UNNES, Sebelas Maret
sustainability of the principles Cooperation Agency in University, British Duta
and ethics of diversity that Indonesia (BKPTKI) together Wacana, English Satya Wacana,
supports this nation. with the PMK Harapan Bangsa ITN Malang, Yogyakarta State
However, diversity is not fully Institute of Technology (ITHB) University, UNLA, STT Jakarta,
understood as an orientation sees the need to build a forum U K R I D A , U P N Ve t e r a n s
and role model of action. or network among Christian Yo g y a k a r t a , I T H B , U P H ,
Diversity and diversity are not students, to build a view of Maranatha Christian University,
essential graces from Almighty relationships between students Telkom University, Itenas,
God. Various cases discussing as candidates future leaders to Widyatama, Binus, and
minority groups, indications of defend the Republic of Cendrawasih University, with a
radicalism, to efforts to Indonesia based on Pancasila, total of 65 campuses from
infiltrate. the 1945 Constitution, and major islands in Indonesia.
Unity in Diversity. Therefore,
In 2011, the Indonesian BK-PTKI needs to hold a Dr. Ir. Paristiyanti Nurwardani,
Institute of Sciences (LIPI) meeting of Christian Student MP (Director of Learning,
published a report that was Fellowship organizers from all Directorate General of Learning
published reporting an tertiary institutions under the and Student Affairs, Ministry of
increase in radicalism on major coordination of BK-PTKI and Research, Technology and
campuses in Indonesia. The other universities outside BK- Higher Education) was also
2013 Maarif Institute study PTKI, but who support to present representing the
confirmed the LIPI research support, which can help minister to discuss
results. Campus Becomes a connect Christian student appreciation of the JPMKI
Promising Environment for fellowships throughout declaration which is said to be a
radical bearers of Indonesia . The event was held milestone in Indonesia's unity.
understanding. They aim at on Saturday, 17 March 2018 at
students who are still in the 08:30 - 16:30 WIB at the ITHB
process of searching for Assembly Hall, 5th Floor, Jl.
identity and are innocent, and Dipatiukur No. 80 - 84
most do not have a strong Bandung, West Java. Filled with
background in understanding lectures from Christian figures
religion. Therefore universities and nationalities such as Ps.
must have a vision to uphold Nus Reimas, and Dr. (HC)
the unity of Indonesia, by Jonathan Limbong Parapak,
strengthening the concepts of M.Eng.Sc., the worship of all
SALOMO
nationality and diversity participants of the Christian
among students. Students Student Association in
must determine the attitude to Indonesia, and the declaration
establish nationality and of the Indonesian Christian
diversity in the Homeland. Student Association (PMK)
Moreover, Christian students Network, with a passion for
who have known the love of conducting a diverse, equal, fair

48 The Excellent Study In Mulia University | TI1A | September 2019 Edition


TI1A
2019

“The Basis of Computer Work Is Predicated On e Idea


at Only e Brain Makes Decisions and Only
Index Finger Does e Work.”
— Brian Eno —
universitasmulia.ac.id
Mulia University
muliauniversity
Mulia University
Jl. Letjend. TNI. Z.A Maulani No. 9 Damai, Bahagia,
Balikpapan Kota, Kota Balikpapan, Kalimantan Timur 76114

You might also like