The GREATEST risk when end users have access to a database at its system level, instead of through the application, is that the users can:
A、make unauthorized changes to the database directly, without an audit trail.
B、make use of a system query language (SQL) to access information.
C、remotely access the database.
D、update data without authentication.