Home ยป Past Questions ยป Computer-studies ยป Waec ยป 2019 ยป The following actions are sources of breaches in computing except?