Start learning 50% faster. Sign in now
Get Started with ixamBee
Start learning 50% faster. Sign in nowSection 108. Abettor: A person abets an offence, who abets either the commission of an offence, or the commission of an act which would be an offence, if committed by a person capable by law of committing an offence with the same intention or knowledge as that of the abettor. Explanation 1—The abetment of the illegal omission of an act may amount to an offence although the abettor may not himself be bound to do that act. Explanation 2—To constitute the offence of abetment it is not necessary that the act abetted should be committed, or that the effect requisite to constitute the offence should be caused. Explanation 3—It is not necessary that the person abetted should be capable by law of committing an offence, or that he should have the same guilty intention or knowledge as that of the abettor, or any guilty intention or knowledge. Explanation 4—The abetment of an offence being an offence, the abetment of such an abetment is also an offence. Explanation 5—It is not necessary to the commission of the offence of abetment by conspiracy that the abettor should concert the offence with the person who commits it. It is sufficient if he engages in the conspiracy in pursuance of which the offence is committed.
What is the purpose of a firewall in computer networks?
Which protocol is used to securely transfer web pages?
What is the purpose of an intrusion detection system (IDS)?
The first computer virus is ?
Which feature is used to edit the same text across multiple slides in LibreOffice Impress?
The ‘Sort & Filter’ group is available under which of the following tabs in MS Excel 365?
Which of the following is a type of malicious software designed to harm or exploit any computer system?
Which of the following are possible signs of a malware infection?
What is a "phishing" attack?
In LibreOffice Impress, notes for each slide are visible only to whom?