The following actions are sources of breaches in computing except? By: Sunday|Published on: Jan 24|Categories: Computer Studies WAEC| 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:Double counting is a problem in computing national…Which of the following actions does not occur during…In computing national income; transfers are excluded…A bit as used in computing in digital communication is?In order to avoid damages caused by security…SEE ALSO A pictorial representation of the logic of a program is called?