What should itexperts do to develop source to target testing

Assignment Help Computer Engineering
Reference no: EM131273281

I need an person who highly skilled IT project manager, data analyst or business systems analyst to assist me with a source to target mapping test plan instructions. I need word document that will provide me with the instructions on what the Testers need to be validating.

As I stated, I don't need the test plan template, I just need instruction on what they should be checking during the testing.

What should they do to execute the test plan. Should they validate data values from the source to the target system.

Should they checks the data values in the source system and the corresponding values in the target system after transformation.

I have to created a source to target mapping test plan to provide to data owners where I am extracting their data to integrated into a data repository. The data in the data repository will be used to display in web application.

There is an ETL process. In the ETL there are no changing dimensions or transformation logic to the data. The mapping is a direct 1 to 1 mapping from source to the target elements.

Reference no: EM131273281

Questions Cloud

Find most beneficial to use in your work or school setting : What technology do you find most beneficial to use in your work or school setting? Least beneficial? Why do you find this tool useful or not? Then, using your imagination, look to the future and think about how this tool could be enhanced even furthe..
Influence of the culutre on leading an organization : You are a manager and leader in adiverse orgainzation that includes locations in many countries. You are asked to careate presetation to share your experiences regarding leadership.
Distinguish between civil rights and civil liberties : Distinguish between civil rights and civil liberties in context of Supreme Court protection of freedom of expression. Identify informed opinions on issues and questions involving the U.S. government and the notion of democracy.
Differences between virtual and traditional organization : What are some of the major differences between a virtual and traditional organization? When managing a virtual team, you must lay the ground rules regarding communication expectations from team members, describe ground rules that should be establishe..
What should itexperts do to develop source to target testing : What should they do to execute the test plan. Should they validate data values from the source to the target system and Should they checks the data values in the source system and the corresponding values in the target system after transformation.
Does type of work seem trivial to you or do you see value : Why is a focus on the cooking behavior of families relevant to the study of societies? Does this type of work seem trivial to you or do you see value?
Project management using network diagrams : Project Management using network diagrams (PERT and CPM) in Operations. Finding and using the Critical Path in network diagrams in Operations. Reducing the project completion time (crashing) in Operations.
What are the sources of stress : After completing the post-graduation, Ms. Maria began her career as a management trainee in the renowned hospital. After three years of job, her performance was moderate. Her Manager Stephen every time he critic her work and he is very authoritarian...
How information sharing in negotiations can contribute : Develop an argument to show that an imbalance of negotiating power probably existed between the parties during the negotiations. Identify the factors accounting for the imbalance. Identify strategies that either party could have used to increase it..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd