Question
Consider the following statements regarding Section 67B
of the IT Act, 2000: 1. It deals with material depicting children in sexually explicit acts. 2. It covers browsing, collecting and downloading such material. 3. It applies only when the material is physically printed. Which of the above are correct?Solution
Section 67B of the IT Act targets child sexual abuse material (CSAM) in electronic form. The provision criminalises production, possession, collection, downloading, or browsing of material depicting children in sexually explicit acts. Statements 1 and 2 are correct: the Act explicitly criminalises such material and includes digital activities such as browsing, collecting, and downloading. Statement 3 is incorrect because physical printing is not required; the offence exists entirely in the digital domain. The law’s objective is to prevent exploitation of children in cyberspace, and the penal framework applies to both direct and indirect possession or engagement with illegal material. Sections 67B and 66E demonstrate the IT Act’s focus on protecting vulnerable groups and individual privacy, ensuring digital safety and ethical conduct in cyberspace. Option A is therefore correct. The incorrect options fail to capture the dual digital scope (possession and transmission) of the section.
A disk scheduling system receives requests for the following cylinders: 98, 183, 37, 122, 14, 124, 65, 67. If the current position of the disk head is a...
Given the following SQL query:
SELECT department _ id, COUNT(*) AS employee _ count
FROM employees
GROUP BY department_id
HA...
Which machine learning model is most appropriate for detecting spam emails, considering its ability to handle high-dimensional data and probabilistic pr...
Consider the following code snippet. What is the output of the program?Â
#include < stdio.h >
int main ( ) {
  int arr[5] = {1...
In data management, what role does metadata play when working with a large dataset of customer transactions?
Which of the following statements best explains the role of a hypervisor in virtualization?
Which searching algorithm is most suitable for a balanced binary search tree (BST) when the goal is minimal comparison?
Which of the following is a primary application of Natural Language Processing (NLP)?
Which of the following best illustrates the use of trend analysis in marketing?
Which of the following methods is most commonly used during data wrangling to handle missing values in a dataset?