Start learning 50% faster. Sign in now
Section 108. Abettor: A person abets an offence, who abets either the commission of an offence, or the commission of an act which would be an offence, if committed by a person capable by law of committing an offence with the same intention or knowledge as that of the abettor. Explanation 1—The abetment of the illegal omission of an act may amount to an offence although the abettor may not himself be bound to do that act. Explanation 2—To constitute the offence of abetment it is not necessary that the act abetted should be committed, or that the effect requisite to constitute the offence should be caused. Explanation 3—It is not necessary that the person abetted should be capable by law of committing an offence, or that he should have the same guilty intention or knowledge as that of the abettor, or any guilty intention or knowledge. Explanation 4—The abetment of an offence being an offence, the abetment of such an abetment is also an offence. Explanation 5—It is not necessary to the commission of the offence of abetment by conspiracy that the abettor should concert the offence with the person who commits it. It is sufficient if he engages in the conspiracy in pursuance of which the offence is committed.
Which of the following is the primary reason why polymorphism is useful in Object-Oriented Programming (OOP)?
Which of the following types of software testing ensures that previously working functionality is still operational after changes?
Which of the following accurately describes the role of virtual memory in modern operating systems?
Which I/O scheduling algorithm is most suitable for minimizing seek time in hard drives?
Which of the following is NOT a characteristic of a minimum spanning tree (MST) in a connected, undirected graph?
Which of the following is an effective countermeasure against Cross-Site Scripting (XSS) attacks in a web application?
In an IoT ecosystem, which protocol is most efficient for constrained devices communicating over lossy networks?
...Which OSI model layer is responsible for reliable delivery of data between devices?
In Java, what will be the output of the following code snippet?
public class Test {
public static void main(String[] args) {...
Which SQL command is used to remove only specific rows from a table while preserving the structure and other rows?