Across
1
Security system blocking unauthorized access
5
Information processed by a computer
6
Global computer network
7
Software designed to harm computers
Down
2
Display screen for a computer
3
Request for information from a database
4
Physical components of a computer
8
Convert code into executable program
