Professional Documents
Culture Documents
Ibayo Silangan
Naic, Cavite
BUSINESS LOGIC
College Department
ERRATA
Typo errors on the spelling and some addition/omission of words made by the
typist had been discovered after this booklet/module has been released.
Should you have any question, doubt, confusion; or if you need clarification on
any section/article /item, please feel free to see the Registrar’s Office.
Thank you.
Granby President
LESSON 1
I – READING
Business logic
is the programming that manages communication between an end user interface and a
database. The main components of business logic are business rules and workflows. A
business rule describes a specific procedure; a workflow consists of the tasks, procedural
steps, required input and output information, and tools needed for each step of that
procedure. Business logic describes the sequence of operations associated with data in a
database to carry out the business rule.
Business logic is a method of implementing a company's guidelines in their database
systems, allowing employees the ability to perform important work actions using a
computer.
Example
Business logic for a retail store might contain inventory information and can help track how
many products you sell in a specific timeframe. Business logic can also determine how to
calculate numerical data for varied purposes, including sales and tax information.
LESSON 2
I – READING
Business logic:
Prescribes how business objects interact with one another
Enforces the routes and the methods by which business objects are accessed and updated
Business rules:
Model real-life business objects (such as accounts, loans, itineraries, and inventories)
Business logic comprises:
Workflows that are the ordered tasks of passing documents or data from one participant (a
person or a software system) to another.
Example:
The sequence of events that happens during checkout, for example a multi-page form which
first asks for the shipping address, then for the billing address, next page will contain the
payment method, and last page will show congratulations.
Specific formats that the visitor's address, email address, and credit card information must
follow.
Peripheral content not related to the core business data, such as the HTML that defines the
colors, appearance, background image, and navigational structure of the site
Generic error-handling code (e.g., which displays the HTTP Error Code 500 page)
Initialization code that runs when the web server starts up the site, which sets up the system
Monitoring infrastructure to make sure all the parts of the site are working properly (e.g., the
billing system is available)
Generic code for making network connections, transmitting objects to the database, parsing
user input via HTTP POST events, etc.
LESSON 3
I – READING
This makes it more likely that changes to business logic will require a small set of code
changes, in only one part of the code. Distant but strongly coupled code also creates more
of a risk that the programmer will only make some of the necessary changes and miss part
of the system, leading to incorrect operation.
The business rules approach of software development uses BRMSs and enforces a very
strong separation of business logic from other code. User interface management
systems are another technology used to enforce a strong separation between business
logic and other code. The magic pushbutton is considered an "anti-pattern": a technique that
in this case creates undesirable constraints which make it difficult to code business logic in
an easy-to-maintain way.
Data validation
Data validation describes a careful process of maintaining accurate and high-quality data.
To use data validation in your business logic, you can create a testing procedure within a
database program to better ensure people can input the right data in the proper location.
For example, data validation can determine whether a person inputs the correct spelling and
format of street address data.
Data Check -Inspects if an inputted line of data reflects a correct classification, like
text versus numerical data
Length Check - Reviews whether the inputted data has the correct amount of
information, including whether it's too long for a certain bracket
Range Check - Observes if number data fits within a pre-determined scope of
numbers and integers, like 10 to 100
Data Order Check - To determine if the inputted data reflects a logical order, like a
package delivery date recorded after a customer ordered the time it carries
Uniqueness Check - For observing whether a person inputs the same line of data
twice into the same program, which might cause certain errors to appear
Atomicity - This property describes how a person changes multiple sections of data
with one action while accounting for all aspects of that data. For example, if a
customer purchases an item, the atomicity property shows that a transaction
removed that item from your inventory.
Consistency - Like the aforementioned component of business logic, this property
highlights how a person can only change data under certain conditions. It also shows
pre-transaction data reflects an accurate post-transaction state.
Isolation - This property describes how data used during a transaction is invisible to
some users until you complete it entirely, meaning another person cannot use it for
another transaction at the same time. For example, some banking applications only
allow customers to make one bank transfer per day to incorporate the isolation
property.
Durability - After you complete a transaction, the durability property describes how
the data effects are permanent, meaning they can remain active if a database ever
malfunctions in the future. Conversely, it highlights how a database can restore itself
to a pre-transaction state if a malfunction occurs during the process.
- End -
BUSINESS LOGIC ACTIVITY SHEET
2021, second semester
Professor: Bernabe A. Vinzon Jr., MBA
Send to: jojo_vinzon@yahoo.com
NAME:________________________________ Course:____________________________
ACTIVITY IN LESSON 1
1. Draw a computer keyboard and try to use it as your 3D keyboard using all your
fingers, type the following:
“THE QUICK BROWN FOX JUMPS OVER THE HEAD OF THE LAZY DOGS!”
a. What finger did you use in typing the letter “A” _____________________
b. What finger did you use in typing the letter “J” _____________________
c. What finger did you use in typing the letter “O”
_____________________
d. What finger did you use in typing the letter “K” _____________________
e. What finger did you use in typing the letter “SPACE BAR” _____________________
ACTIVITY IN LESSON 2
1. If you logging-in using wrong information in an e-commerce website, what did you
notice most? Explain and give me your thoughts.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
1. _________________________________________________________________
2. _________________________________________________________________
3. _________________________________________________________________
4. _________________________________________________________________
5. _________________________________________________________________
ACTIVITY IN LESSON 3
A. __________________________________________________________________
B. __________________________________________________________________
C. __________________________________________________________________
D. __________________________________________________________________
E. __________________________________________________________________