Boarding House Search Information System Database Design
DOI:
https://doi.org/10.34306/ijcitsm.v2i1.89Keywords:
Database, DBLC, Searching Boarding House, System Information.Abstract
Technological advancements are causing humans to produce several inventions and developments to accomplish anything. Which one utilizes internet technology to obtain information as quickly and simply as possible? For example, if someone moves to a new area for work or school, they will need boarding houses. However, this information is difficult to obtain because it is traditionally passed down from person to person, and the boarding house owner finds it difficult to promote his boarding house. As a result, individuals require a computerized system to resolve this issue. This study aims to create a database design for a boarding home information system. This study employs the DBLC (Database Life Cycle) technique, which illustrates the life cycle of a database that may be developed at any time. Database design is separated into three parts: conceptual, logical, and physical database design.
References
M. Alam, H. Malik, M. Khan, T. Pardy, … A. K.-I., and undefined 2018, “A survey on the roles of communication technologies in IoT-based personalized healthcare applications,” ieeexplore.ieee.org, Accessed: Feb. 16, 2022. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8404033/
B. M.-H. B. and E. Technologies and undefined 2019, “Parent distraction with phones, reasons for use, and impacts on parenting and child outcomes: A review of the emerging research,” Wiley Online Library, vol. 1, no. 2, pp. 72–80, Apr. 2019, doi: 10.1002/hbe2.139.
D. Immaniar, N. Azizah, D. Supriyanti, N. Septiani, and M. Hardini, “PoTS: Proof of Tunnel Signature for Certificate Based on Blockchain Technology,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 101–114, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/28
D. Cahyadi, A. Faturahman, H. Haryani, E. Dolan, and S. millah, “BCS : Blockchain Smart Curriculum System for Verification Student Accreditation,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 65–83, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/20
S. Watini, T. Nurhaeni, and L. Meria, “Development Of Village Office Service Models To Community Based On Mobile Computing,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 189–196, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/51
T. Ayuninggati, N. Lutfiani, and S. Millah, “CRM-Based E-Business Design (Customer Relationship Management) Case Study : Shoe Washing Service Company S-Neat-Kers,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 216–225, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/58
M. Mulyati, I. Ilamsyah, A. Aris, iketut gunawan, and M. Suzaki Zahran, “Blockchain Technology: Can Data Security Change Higher Education Much Better?,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 121–135, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/36
G. Maulani, G. Gunawan, L. Leli, E. Ayu Nabila, and W. Yestina Sari, “Digital Certificate Authority with Blockchain Cybersecurity in Education,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 136–150, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/40
T. Nurhaeni, N. Lutfiani, A. Singh, W. Febriani, and M. Hardini, “The Value of Technological Developments Based on An Islamic Perspective,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 1–13, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/4
W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation Of E-Business Information System In Indonesia : Prospects And Challenges,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 180–188, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/49
M. R. Anwar, R. Panjaitan, and R. Supriati, “Implementation Of Database Auditing By Synchronization DBMS,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 197–205, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/53
B. Rawat and S. Purnama, “MySQL Database Management System (DBMS) On FTP Site LAPAN Bandung,” International Journal of Cyber and IT Service Management, vol. 1, no. 2, pp. 173–179, 2021.
N. P. Puji, A. Dudhat, H. Teja Sukmana, A. Mardiansyah, and M. Hardini, “Modern Technology Advances with Benefits for Humanity to Demonstrate Design with Conventional Sources Islamic,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 14–36, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/8
A. Alwiyah, S. Husin, P. Padeli, M. Anggaraeni, and S. Sulistiawati, “Alignment of Science and Technology With Islamic Principles Using Quantum Theory,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 115–120, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/32
P. Edastama, A. Dudhat, and G. Maulani, “Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 206–215, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/55
P. Edastama, A. S. Bist, and A. Prambudi, “Implementation Of Data Mining On Glasses Sales Using The Apriori Algorithm,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 159–172, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/46
Y. Durachman, A. Sean Bein, E. Purnama Harahap, T. Ramadhan, and F. Putri Oganda, “Technological and Islamic environments: Selection from Literature Review Resources,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 37–47, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/12
T. Ramadhan, Q. Aini, S. Santoso, A. Badrianto, and R. Supriati, “Analysis of the potential context of Blockchain on the usability of Gamification with Game-Based Learning,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 84–100, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/24
D. Apriani, A. Williams, U. Rahardja, A. Khoirunisa, and S. Avionita, “The Use of Science Technology In Islamic Practices and Rules In The Past Now and The Future,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 48–64, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/16
I. Y. Ruhiawati, A. P. Candra, and S. N. Sari, “Design and Build a Multimedia System for Indonesian Religious Activities Based on Android,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 233–239, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/64
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Muhammad Rehan Anwar, Suryari Purnama.

This work is licensed under a Creative Commons Attribution 4.0 International License.