Across
1
Online data storage and computing
5
Security system blocking unauthorized access
6
Connected group of computers
7
Temporary storage for fast access
8
Wireless internet connection
Down
2
Encode data to keep it secure
2
Conversion of data into secret code
3
Physical components of a computer
4
Reusable block of code
9
Rules for data communication
10
Software designed to harm computers
