In Karnataka , A policy has been framed for paying a compensation of ₹7.5 lakh to the next of kin of the prisoners in case of unnatural death of prisoner due to a quarrel among prisoners, and ₹5 lakh in case of other unnatural deaths, including suicide, within the prisons The policy was framed on the directions issued by the Supreme Court and the High Court, which had in 2017 initiated a suo motu PIL on the top court’s orders to ensure that the State government formulated a scheme to identify prisoners who died unnaturally while in prison since 2012, identify the next of kin of deceased prisoners, and pay reasonable compensation to them ‘Grievances addressed’ A Division Bench comprising Chief Justice Prasanna B. Varale and Justice Krishna S. Dixit, which took note of the policy, framed in October 2022, disposed of the petition while observing that the government had appropriately addressed and redressed the grievances raised in the petition Not for natural death However, as per the policy, no compensation would be paid in case of natural death, including death due to illness of the prisoners Also, no compensation would be paid if the death occurs while escaping from prison or while on parole or lawful custody outside the prison; and if the death occurs due to natural disaster/calamity. About Karnataka Chief minister: Siddaramaiah Governor: Thawar Chand Gehlot Capital: Banglore
________ is the highest priority interrupt capable of interrupting all software and non-vital hardware devices.
Which of the following is a type of malware intentionally inserted into a software system that will set off a malicious function when specified conditio...
What does Li-Fi technology primarily use for data transmission?
Which of the following is not the largest memory and compare to the other available options?
A user communicates with a computer with the help of:
Which of these are examples of interpreted programming languages?
Which of the following is an example of non-volatile memory?
Which hardware component bridges the gap in data transfer speeds between devices?
IC chips used in computers are usually made of:
A malicious software that disguises itself as a legitimate application is referred to as: