The following actions are sources of breaches in computing except? By: Sunday|Published on: Jan 24|Categories: Computer Studies WAEC| 0 comments A. carelessness B. hackers’ threat. C. piracy. D. viruses. Correct Answer: Option A – carelessness Users Also Read These:A bit as used in computing in digital communication is?In computing, ALU stands?In computing, external storage is called?The pre-computing age device which made use of beads…Which of the following is the best method for…SEE ALSO Which of the following networks covers the widest range?