Answer:
The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques
Step-by-step explanation:
The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques