Start learning 50% faster. Sign in now
Explanation: Section 378. Theft—Whoever, intending to take dishonestly any movable property out of the possession of any person without that person's consent, moves that property in order to such taking, is said to commit theft. Explanation 1—A thing so long as it is attached to the earth, not being movable property, is not the subject of theft; but it becomes capable of being the subject of theft as soon as it is severed from the earth. Explanation 2—A moving effected by the same act which effects the severance may be a theft. Explanation 3—A person is said to cause a thing to move by removing an obstacle which prevented it from moving or by separating it from any other thing, as well as by actually moving it. Explanation 4—A person, who by any means causes an animal to move, is said to move that animal, and to move everything which, in consequence of the motion so caused, is moved by that animal. Explanation 5—The consent mentioned in the definition may be express or implied, and may be given either by the person in possession, or by any person having for that purpose authority either express or implied. Section 416. Cheating by personation.—A person is said to “cheat by personation” if he cheats by pretending to be some other person, or by knowingly substituting one person for or another, or representing that he or any other person is a person other than he or such other person really is. Explanation—The offence is committed whether the individual personated is a real or imaginary person. Section 420. Cheating and dishonestly inducing delivery of property—Whoever cheats and thereby dishonestly induces the person deceived to deliver any property to any person, or to make, alter or destroy the whole or any part of a valuable security, or anything which is signed or sealed, and which is capable of being converted into a valuable security, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine
Output is
In a multi-user operating system, what does it allow multiple users to do simultaneously?
Which of the following ports connects special types of music instruments to sound cards?
Which of the following is a popular example of an Operating System?
Which of the following is an example of telecommunication?
A ________ is a program which coverts the entire source code of a programming language into executable machine code for a CPU.
Which of the following is not a Computer language ?
A telecommunications network which allows computers to exchange data is known as
A set of programs that enables your computer’s hardware devices and application software to work together is called
____________ is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious r...