Answer:
The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques
Explanation:
The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques