Vol. 5 No. 3 (2023): bit-Tech

DISCLAIMER
The editors and publishers of the bit-Tech have made every possible information possible in the publication. Any opinions, discussions, views, and recommendations are expressed in the article are solely those of the authors and are not of bit-Tech, its editors, or its publishers. bit-Tech, its editors and its publisher will not be liable for any direct, indirect, consequential, special, exemplary, or other damages arising therefrom
Full Issue
Articles
-
Data Sales Application of Small Enterprises Using Growth Ratio Method
DOI : https://doi.org/10.32877/bt.v5i3.558
Abstract views: 193 /
PDF downloads: 215
-
Usability of JKN Mobile Application Using System Usability Scale (SUS) Method
DOI : https://doi.org/10.32877/bt.v5i3.691
Abstract views: 550 /
PDF downloads: 514
-
Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases
DOI : https://doi.org/10.32877/bt.v5i3.728
Abstract views: 326 /
PDF downloads: 331
-
Boarding House Provider Information with Multi Attribute Utility Theory (MAUT) Method
DOI : https://doi.org/10.32877/bt.v5i3.729
Abstract views: 358 /
PDF downloads: 302
-
Information System Web Design For Class English Proficiency Test Using Fisher Yates Shuffle Method
DOI : https://doi.org/10.32877/bt.v5i3.724
Abstract views: 183 /
PDF downloads: 186
-
Asset and Inventory Data Monitoring Application Design PT. Transmarco
DOI : https://doi.org/10.32877/bt.v5i3.731
Abstract views: 431 /
PDF downloads: 302