The following actions are sources of breaches in computing except? by Sunday | Jan 24 | Computer Studies WAEC | 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:Security breaches in computing cannot be prevented…The following actions are the effects of virus…In order to avoid damages caused by security…A country's constitution could be derived from the…All the following are sources of revenue to local…