The following actions are sources of breaches in computing except? By: Sunday|Published on: Jan 24|Categories: Computer Studies WAEC| 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:SS1 First Term Data Processing Lesson Note – History…Which of the following is the best method for…Double counting is a problem in computing national…A bit as used in computing in digital communication is?Security breaches in computing cannot be prevented…SEE ALSO The word bit refers to?