Start learning 50% faster. Sign in now
Section 31 and 32 of the Act deals with penalty for breach of protection order by respondent, cognizance and proof Section 31- Penalty for breach of protection order by respondent—(1) A breach of protection order, or of an interim protection order, by the respondent shall be an offence under this Act and shall be punishable with imprisonment of either description for a term which may extend to one year, or with fine which may extend to twenty thousand rupees, or with both. (2) The offence under sub-section (1) shall as far as practicable be tried by the Magistrate who had passed the order, the breach of which has been alleged to have been caused by the accused. (3) While framing charges under sub-section (1), the Magistrate may also frame charges under section 498A of the Indian Penal Code (45 of 1860) or any other provision of that Code or the Dowry Prohibition Act, 1961 (28 of 1961), as the case may be, if the facts disclose the commission of an offence under those provisions. 32. Cognizance and proof—(1) Notwithstanding anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), the offence under sub-section (1) of section 31 shall be cognizable and non-bailable. (2) Upon the sole testimony of the aggrieved person, the court may conclude that an offence under sub-section (1) of section 31 has been committed by the accused.
What is the primary role of a Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
In the context of page replacement algorithms, which one minimizes page faults in an ideal scenario?
Given the IP address 192.168.10.5 and the subnet mask 255.255.255.240 , what is the range of valid host addresses in this subnet?
Which of the following is NOT a characteristic of a minimum spanning tree (MST) in a connected, undirected graph?
What will be the output of the following Java snippet?
class A {
public void display() {
System.out.pr...
Which memory type is the fastest but most expensive, typically located directly on the CPU?
In system design, what is the primary purpose of a feasibility study?
Which of the following scenarios violates Boyce-Codd Normal Form (BCNF) in a relational schema?
Which of the following represents the Preorder Traversal of the binary tree given below?
A / \ B C ...In the context of Management Information Systems (MIS), which of the following best describes the role of a decision support system (DSS)?