Question
Consider the following statements regarding Section 66B
(Dishonestly Receiving Stolen Computer Resources) of the IT Act, 2000: Statement 1: A person who knowingly receives stolen computer resources commits an offence under Section 66B. Statement 2: The offence under Section 66B requires proving that the person knew or had reasonable suspicion that the resources were stolen. Statement 3: Section 66B applies only to physical hardware theft, not to data or digital information. Statement 4: A person dealing in second-hand computers can be liable under Section 66B if they fail to verify the source. Which statements are correct?Solution
Section 66B addresses receiving stolen computer resources—Statement 1 is correct. Knowledge or reasonable suspicion is required—Statement 2 is correct. Statement 3 is incorrect—digital resources are covered. Statement 4 is correct—dealers are liable for negligent receiving. Statements 1, 2, and 4 are correct.
What is the purpose of the delete operator in C++?
The "fetch-decode-execute" cycle in CPU control design refers to the sequence of actions performed for each:
__________ is a subject-oriented, integrated, time-variant, nonvolatile collection of data in support of management decisions.
Attributes are made of more than one simple attribute.
What does the term "bandwidth" refer to in analog electronics?
Which company originally developed the Go programming language?
What is the primary purpose of data deduplication in storage management?
Which distribution is used to model the number of successful outcomes in a fixed number of independent Bernoulli trials?
What is the purpose of the token in a Token Ring network?
Which type of circuit allows current to flow in only one direction?