The following actions are sources of breaches in computing except?

COMPUTER
WAEC 2019

The following actions are sources of breaches in computing except?

  • A. carelessness
  • B. hackers' threat.
  • C. piracy.
  • D. viruses.

Correct Answer: A. carelessness



Post an Explanation Or Report an Error
If you see any wrong question or answer, please leave a comment below and we'll take a look. If you doubt why the selected answer is correct or need additional more details? Please drop a comment or Contact us directly. Your email address will not be published. Required fields are marked *
Add Math
Don't want to keep filling in name and email whenever you make a contribution? Register or login to make contributing easier.