Across
1
Security system blocking unauthorized access
5
Physical components of a computer
6
Point where user interacts with system
7
Conversion of data into secret code
8
Wired networking technology
9
Portable personal computer
10
Pointer on a computer screen
Down
2
Global computer network
3
Rules for data communication
4
Convert code into executable program
