Across
1
Software designed to harm computers
5
Connected group of computers
6
Portable personal computer
7
Encode data to keep it secure
8
Request for information from a database
9
Convert code into executable program
10
Pointer on a computer screen
11
Temporary storage for fast access
Down
2
Input device with letter and number keys
3
Step-by-step problem-solving method
4
Named storage location in code
12
Main processor of a computer
13
Conversion of data into secret code
