Across
1
Data type with true or false values
5
Encode data to keep it secure
5
Conversion of data into secret code
7
Short-range wireless technology
8
Request for information from a database
10
Temporary computer memory
Down
2
Software designed to harm computers
3
Wired networking technology
4
Step-by-step problem-solving method
6
Main processor of a computer
9
Storage location for code
