7. Which of the following is not a proper SQL command for creating database relations? 8. Which of the following database structures should be selected if users want the ability to access data without help from the information technology personnel? B. network c. hierarchical d. tree 9. Which of the following database types has dominance in contemporary systems? 14. Which of the following is not a method of electronic commerce? 15. Which of the following is not a cost of EDI? 28. Achieving which control goal requires that all valid objects or events are captured and entered into a system”s database? 31. The controlled access to files, programs, and documentation is a principal responsibility of which of the following functions? 32. Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan?