Our orders are delivered strictly on time without delay
Analyze an SQL injection attack. Explain how this type of attack can be used to return all user IDs and usernames from a relational database.