The following actions are sources of breaches in computing except? by Sunday | Jan 24 | Computer Studies WAEC | 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:All the following are major sources of air pollution except?The following actions are the effects of virus…Water in the human body is derived from the…In order to avoid damages caused by security…A country's constitution could be derived from the…