The following actions are sources of breaches in computing except?
COMPUTER
WAEC 2019
The following actions are sources of breaches in computing except?
- A. carelessness
- B. hackers' threat.
- C. piracy.
- D. viruses.
Correct Answer: A. carelessness
Post an Explanation Or Report an Error
If you see any wrong question or answer, please leave a comment below and we'll take a look. If you doubt why the selected answer is correct or need additional more details? Please drop a comment or Contact us directly. Your email address will not be published. Required fields are marked *

