How is the risk of improper file access affected upon implementing a database system?
A. Risk varies.
B. Risk is reduced.
C. Risk is not affected.
D. Risk is increased.
A. Risk varies.
B. Risk is reduced.
C. Risk is not affected.
D. Risk is increased.