Across
1
Security system blocking unauthorized access
5
Request for information from a database
6
Point where user interacts with system
7
Program to access the internet
9
Wired networking technology
10
Instructions written for a computer
Down
2
Temporary storage for fast access
3
Short-range wireless technology
4
Computer model of a real-world system
8
Software designed to harm computers
11
Wireless internet connection
