Across
1
Step-by-step problem-solving method
2
Instructions written for a computer
7
Conversion of data into secret code
8
Interface for software to communicate
Down
2
Convert code into executable program
3
Request for information from a database
4
Software designed to harm computers
5
Programs and applications on a computer
6
Temporary storage for fast access
