The following actions are sources of breaches in computing except? by Sunday | Jan 24 | Computer Studies WAEC | 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:All the following are sources of revenue to local…Fats and oils can be obtained from any of the…public expenditure can be financed from all the…Which of the following is the best method for…All the following are sources of constitution except?