What should itexperts do to develop source to target testing

Assignment Help Computer Engineering
Reference no: EM131273281

I need an person who highly skilled IT project manager, data analyst or business systems analyst to assist me with a source to target mapping test plan instructions. I need word document that will provide me with the instructions on what the Testers need to be validating.

As I stated, I don't need the test plan template, I just need instruction on what they should be checking during the testing.

What should they do to execute the test plan. Should they validate data values from the source to the target system.

Should they checks the data values in the source system and the corresponding values in the target system after transformation.

I have to created a source to target mapping test plan to provide to data owners where I am extracting their data to integrated into a data repository. The data in the data repository will be used to display in web application.

There is an ETL process. In the ETL there are no changing dimensions or transformation logic to the data. The mapping is a direct 1 to 1 mapping from source to the target elements.

Reference no: EM131273281

Questions Cloud

Find most beneficial to use in your work or school setting : What technology do you find most beneficial to use in your work or school setting? Least beneficial? Why do you find this tool useful or not? Then, using your imagination, look to the future and think about how this tool could be enhanced even furthe..
Influence of the culutre on leading an organization : You are a manager and leader in adiverse orgainzation that includes locations in many countries. You are asked to careate presetation to share your experiences regarding leadership.
Distinguish between civil rights and civil liberties : Distinguish between civil rights and civil liberties in context of Supreme Court protection of freedom of expression. Identify informed opinions on issues and questions involving the U.S. government and the notion of democracy.
Differences between virtual and traditional organization : What are some of the major differences between a virtual and traditional organization? When managing a virtual team, you must lay the ground rules regarding communication expectations from team members, describe ground rules that should be establishe..
What should itexperts do to develop source to target testing : What should they do to execute the test plan. Should they validate data values from the source to the target system and Should they checks the data values in the source system and the corresponding values in the target system after transformation.
Does type of work seem trivial to you or do you see value : Why is a focus on the cooking behavior of families relevant to the study of societies? Does this type of work seem trivial to you or do you see value?
Project management using network diagrams : Project Management using network diagrams (PERT and CPM) in Operations. Finding and using the Critical Path in network diagrams in Operations. Reducing the project completion time (crashing) in Operations.
What are the sources of stress : After completing the post-graduation, Ms. Maria began her career as a management trainee in the renowned hospital. After three years of job, her performance was moderate. Her Manager Stephen every time he critic her work and he is very authoritarian...
How information sharing in negotiations can contribute : Develop an argument to show that an imbalance of negotiating power probably existed between the parties during the negotiations. Identify the factors accounting for the imbalance. Identify strategies that either party could have used to increase it..

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Question1 runattached file addtwonumbersmas is a marie

question1 runattached file addtwonumbers.mas is a marie program to do plain addition of two number already stored in

  Data mining is a powerful and tool but it poses challenges

data mining is a powerful and tool but it poses challenges to the protection of individual privacy. data mining can

  The open systems interconnection model is inherently

the open systems interconnection model is inherently inefficient. on the source host each layer must take the work of

  Implementation and explain the measured behavior

Analyze your threaded implementation by comparing its performance to the original non-threaded implementation and explain the measured behavior.

  Build a code in preparation for creating a spell-checker

Write down a code in preparation for creating a spell-checker. For now don't worry about actually spell checking: Just write a program that can read in the dictionary word by word.

  Graph a flowchart or pseudocode

Graph a flowchart or pseudocode

  Design a pseudocode algorithm

design a pseudocode algorithm you would write for a simple task like making a turkey sandwich, as well as three simple control structures that could be used to create this algorithm. What do you think is the most difficult part of creating the alg..

  Write down a 2- to 3-page memo describing the financial

write a 2- to 3-page memo explaining the financial implications of your project that does the following middot

  Department in a global multinational company

CIS8000 Assignment - In the design process, the best way to show customers, managers, and programmers the product you have in mind and want to create is to make a mockup of the views that compose the application user interface.

  Make a `show me'' button that displays the number

Write down a GUI program that is a game to be played by the user. A new employee is working on a classified mission and the program will randomly pick an expected profit to be guessed by the user. The program must randomly select a number within r..

  Write the code used in a for loop

Write the code used in a for loop

  Hazard detection

Repeat the same exercise for (a) and (b), but now use NOPs only when a hazard cannot be avoided by changing or rearranging these instructions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd