The following actions are sources of breaches in computing except? by Sunday | Jan 24 | Computer Studies WAEC | 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:Sources of nitrogen to the soil include the…All the following are sources of constitution except?All the following are sources of revenue of a…public expenditure can be financed from all the…A country's constitution could be derived from the…