Recent Searches
MASCO Code
3512-08
Compare
Database Assistant
STEM
Database Assistant provides database and record keeping support, and performs various administrative and clerical duties, in business, academic and organizational settings.
Alternative Names
Tasks
Perform system administration and database related tasks
Maintain and provide daily system support
Install, upgrade and administer business tools and applications
Install and configure infrastructure and develop environment
Install, monitor and perform tuning of SQL Server based applications
  • M
    Professional, Scientific And Technical Activities
  • IT-121-4:2011
    Database Programming
  • 0611
    Information Technology and Information System
  • 0688
    Inter-Disciplinary Programmes and Qualifications Involving Information and Communication Technologies
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems. 
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Active Learning
Proficiency in applying new knowledge. 
Khusus
Working with Computers
ability to use computers and other digital tools to develop, install and maintain ICT software and infrastructure.
Food Safety
proficiency in food handling, preparation, and storage practices that preserve food quality to prevent contamination and food-borne diseases.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Network Administration
proficiency in administering and managing the computer networks of one or many organisations.
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
Center Image