Across
1
Step-by-step problem-solving method
4
Global computer network
8
Security system blocking unauthorized access
Down
2
Pointer on a computer screen
3
Connected group of computers
5
Physical components of a computer
6
Wireless internet connection
7
Software designed to harm computers
9
Conversion of data into secret code
10
Device that directs network traffic
11
Encode data to keep it secure
