Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views2 pages

DATA Testing and ETL Testing...

Uploaded by

postbox181
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

DATA Testing and ETL Testing...

Uploaded by

postbox181
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Data Testing Scenarios:

● Data Quality Checks:


○ Accuracy: Verify data matches source systems or expected values.
■ Scenario: Testing if customer addresses are correctly populated and linked to their
respective orders.
○ Completeness: Ensure all required fields are populated.
■ Scenario: Checking if all order details (customer ID, product ID, quantity, price) are
present in the order table.
○ Consistency: Verify data is consistent across different systems or within the same system.
■ Scenario: Ensuring customer contact information is the same in the customer master
table and order details.
○ Uniqueness: Ensure no duplicate records exist.
■ Scenario: Checking for duplicate customer IDs or order numbers.
○ Validity: Verify data conforms to predefined rules and formats.
■ Scenario: Validating email addresses, phone numbers, and date formats.
● Data Integrity Checks:
○ Referential Integrity: Verify relationships between tables are correctly maintained.
■ Scenario: Ensuring every order ID in the order details table has a corresponding order
in the orders table.
○ Domain Integrity: Verify data values fall within expected ranges or sets.
■ Scenario: Checking if product quantities are non-negative and within stock limits.
● Data Security Checks:
○ Data Masking: Verify sensitive data is appropriately masked or anonymized.
■ Scenario: Checking if credit card numbers are masked in audit logs.
○ Data Encryption: Verify sensitive data is encrypted at rest and in transit.
■ Scenario: Testing the encryption and decryption of sensitive data in databases and
during data transfers.

ETL Testing Scenarios:


● Source-to-Target Data Validation:
○ Data Volume: Verify the number of records extracted from the source system matches the
number loaded into the target system.
○ Data Completeness: Ensure all data from the source system is extracted and loaded into
the target system.
○ Data Accuracy: Verify the accuracy of data transformations and mappings during the ETL
process.
■ Scenario: Testing if currency conversions are applied correctly during the ETL process.
○ Data Consistency: Ensure data consistency is maintained throughout the ETL process.
■ Scenario: Checking for discrepancies in data values between the source and target
systems.
● ETL Process Flow Validation:
○ Control Flow: Verify the ETL process executes in the correct order and with the expected
frequency.
■ Scenario: Testing if the ETL job for daily sales updates runs successfully at the
scheduled time.
○ Error Handling: Verify the ETL process handles errors gracefully and recovers
appropriately.
■ Scenario: Simulating data source errors (e.g., missing files, network issues) and testing
the ETL process's error handling mechanisms.
○ Performance Testing: Verify the ETL process meets performance requirements (e.g.,
execution time, throughput).
■ Scenario: Measuring the execution time of the ETL job for large data volumes and
identifying performance bottlenecks.
● Data Quality Validation in the Target System:
○ Data Profiling: Perform data profiling on the target system to identify data quality issues.
■ Scenario: Generating data quality reports on the target system to identify missing
values, invalid data, and data inconsistencies.
○ Data Cleansing: Verify data cleansing rules are applied correctly in the target system.
■ Scenario: Testing if duplicate records are identified and handled correctly in the target
system.

Note: These are just a few examples, and the specific scenarios will vary depending on the
business requirements, data sources, and target systems involved.

I hope this helps! Let me know if you'd like more specific examples for a particular domain or
technology.

You might also like