11. The following code snippets have security flaws. Which of the choices below can be used as id to achieve the SQL Injection attack? (A) (B) (C) (D) (E)