The GREATEST risk when end users have access to a database at its system level, instead of through the application, is that the users can: 
A、make unauthorized changes to the database directly, without an audit trail. 
B、make use of a system query language (SQL) to access information. 
C、remotely access the database. 
D、update data without authentication.