Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Course: Building Secure Web Application 1) Do a bit of research on JSON and AJAX

Course: Building Secure Web Application 1) Do a bit of research on JSON and AJAX

Computer Science

Course: Building Secure Web Application

1) Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 200-300 words., add 2-3 clickable reference at end 

--------------------------------------------

Course: Policy, Legal, Ethics, & Cmplc 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don't I own the books on my Kindle? If I own them, why can't I transfer them? If I don't own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Question One

Copyright refers to different rights that are automated to vest to a particular individual who created an original work of authorship, such as a movie or literacy work. The parent is used to granting rights to a specific property through a sovereign authority to a particular investor. Trademark refers to a word, name, or even design that is issued for commerce in identifying and distinguishing different goods of a specific seller or manufacturer from those of others. Also, it is used for indication of the source of goods (Wagner, 2018). Trade secrets refer to any practice of a company that is not known to the company outside.

Question Two

Intellectual property is featured to be very important. It is known for granting exclusive rights to the proprietor. Also, it is used to serve as a link between the manufacturers and the consumers, and thus, it enables the identification and association of products with their owners (Wagner, 2018). Hence, it is an important law that is featured with the need for legal protection. It is protected for the sake of the economy.

Question Three

Copyright laws are very vital for the protection of different authorship activities. However, they have become stricter recently. This is because of some reasons. Firstly, the laws are noted not to be serving their required purposes. Secondly, the laws have been featured to be very broad. Lastly, the rules are very complicated, and they are unclear.

Question Four

It is noted to be a legal doctrine featured with the promotion of freedom of expression. It works by ensuring that it permits those not licensed to use the copyright-protected work in some situations (Renda, 2019). It works by analyzing the work by which the purpose of the copyright is applied. Hence, it is vital in various circumstances. In most cases, it the commonly used law.

Question Five

Download while paying for the music. A movie or a song is produced and marketed. Everyone that is involved is supposed to be paid.  Hence, when one downloads films or music, they are supposed to pay (Kavanagh et al., 2019).  In that case, the product is said to be protected with copyright. The product is not supposed to be resold, copied, or reproduced without requesting permission.

Question Six

I do not own the book on my Kindle. I cannot transfer the book as they are protected with a copyright. I am supposed to ask for permission from the owner before transferring the book. Therefore, the book is protected and the property of the owner. Copyrights are essential in almost every organizational setting.

Question Seven

The University Studios Inc. was also regarded as Betamax Case. It refers to the Supreme Court's decision that ruled on the fact that making different individual copies of the complete TV shows is not illegal. The process that is done to shift time is not copyright infringement. Due it is a fair act and usage of the Television shows.

Question Eight

No, Napster was not the one to be held responsible for the different factions of the user. The court rules that Napster was not involved in the provision of services. Therefore, Napster cannot be held responsible for the different actions of people involved in using the software. In addition to the same, the company is regarded as an ISP. Thus, they cannot be responsible for the different actions (Renda, 2019).

Question Nine

Notably, the court found favor of Diamond in the Rio Case for various reasons. Rio is said to get the music from the hard drive of the computer. However, this HDD tends to be used for storing other things apart from music. Hence, Rio is said to have fallen outside the 1992 law.  The original PMP is featured with storing just 300 of 60 minutes of music (Wagner, 2018).

Question Ten

This is an important term in policy enforcement and compliance. It is used for the protection of a work that is copyrighted. It uses different means to ensure that the additional copies are not shared over the network (Kavanagh et al., 2019). It has led to cost-free reproduction and distribution of digital content on a large scale. Also, it led to remixing of digital content.

The same-Origin policy is noted to be important in JSON and Ajax. In Ajax, the same-origin policy refers to the different security policies that aim to define the other rules of how the web page can access additional external resources (Calzavara, 2020). It is an essential policy in Ajax as under this policy. It is noted that the other web browsers do not allow the web page access to different resources that have a different origin than the current page. In this case, the source is regarded as distinct if the scheme, the port, or the hostname of the resource do not match those of the page.

On the other hand, in JSON, the same-origin policy is also featured with its advantages that ensure that the different activities are conducted as required (Lytje et al., 2020). The Same-origin approach focuses on permitting the script running on a given we browser to only make different requests to the page on the same domain. This implies that the additional requests are supposed to have the same hostname, port number, and URI scheme. This is important in JSON and ensures that the request adheres to this policy and uses the same domain (Calzavara, 2020).