Information for detecting unauthorized input from a terminal would be BEST provided by the: A、console log printout. B、transaction journal. C、automated suspense file listing. D、user error report.