Ana loda....

WAEC SSCE - Computer Studies - 2019

Tambaya 1 Rahoto

The following actions are sources of breaches in computing except?