Question
Which one among the following is not a mode of abetment?
Solution
IPC Section 107. Abetment of a thing—A person abets the doing of a thing, who— First—Instigates any person to do that thing; or Secondly—Engages with one or more other person or persons in any conspiracy for the doing of that thing, if an act or illegal omission takes place in pursuance of that conspiracy, and in order to the doing of that thing; or Thirdly.—Intentionally aids, by any act or illegal omission, the doing of that thing. Section 108. Abettor—A person abets an offence, who abets either the commission of an offence, or the commission of an act which would be an offence, if committed by a person capable by law of committing an offence with the same intention or knowledge as that of the abettor. Section 120. Concealing design to commit offence punishable with imprisonment.—Whoever, intending to facilitate or knowing it to be likely that he will thereby facilitate the commission of an offence punishable with imprisonment, voluntarily conceals, by any act or illegal omission, the existence of a design to commit such offence, or makes any representation which he knows to be false respecting such design, if offence be committed; if offence be not committed.—shall, if the offence be committed, be punished with imprisonment of the description provided for the offence, for a term which may extend to one-fourth, and, if the offence be not committed, to one-eight, of the longest term of such imprisonment, or with such fine as is provided for the offence, or with both
The primary function of a 'router' in a network is to:
The term that refers to the process of solving a problem step-by-step is:
Which of the following can create the largest printouts:
.............. file format used for data compression and archiving
The __________________ contains a list of blocks that have been updated in the database buffer.
What does AI stands for in computing?
Which of the following printer types is most suitable for printing high-quality color images and photographs?
The translation of data into a secret code is known as _______
WORM is a data storage technology that prevents the drive from erasing the data. What is the full form of WORM?
A ____'s main purpose is to prohibit unauthorized access to your computer via the Internet.