1) A ____ compares the data between a source system and a target system without transforming the data in either system.
2) The data accuracy of both the source and the target can be checked with a set of ____ operators.
3) ____ the distinct values of critical data columns in the source and target systems is a good way to verify the integrity of critical data columns.
4) A single SQL query cannot convert data because ____.
5) Data Transformation ETL testing involves writing ____ SQL queries for each row in order to confirm the rules of the transformation.
6) It is imperative that we select sufficient and representative data from the source system to perform the successful ____ testing.
7) The document(s) that the ETL tester always uses during the testing process is/are:
8) A ____ contains all the columns and their lookups in reference tables for both source and destination tables.
9) Which of the following is/are the type(s) of ETL Bugs?
10) ____, spelling check, and other issues related to the Graphical User Interface of an application are examples of User Interface bugs.
11) As a result of the ____ bug, invalid values are being taken by the application and valid values are being rejected.
12) Bugs that check for minimums and maximums are called ____ bugs.
13) Mathematical errors show up in ____ bugs, and the results are usually inaccurate.
14) Invalid or invalid types are produced by ____ bugs.
15) Regression Testing bugs do not indicate what version they came from, as they are usually caused by ____ bugs.
16) It is the ETL tester’s responsibility to validate the ____ and extract the data from the target table.
17) ETL testers has/have the following responsibility/ies:
18) Following is/are the type(s) of operations involved in verifying the table in the source system:
19) An ____ procedure is capable of extracting business data from a variety of sources and loading it into a different target as desired.
20) What is/are the benefit(s) of ETL tools?