Some even alter the id proofs and admit playing cards to legitimize the impersonators. An impersonator only really should confidently pose as the initial take a look at-using university student, comprehensive the authentication method and look to the exam.The partial UML course diagram below displays the underlying data design you ought to use to a