You’ve used a database to search your client’s data for a red flag that might indicate fraud. You imported the data into a database and created relationships between table fields. Then you carefully ...