Technology Challenge

Public|
7
3
4
6
9
5
8
10
2
1

Across

1

Reusable block of code

5

Online data storage and computing

7

Convert code into executable program

8

Named storage location in code

10

Rules for data communication

Down

1

Security system blocking unauthorized access

2

Main processor of a computer

3

Point where user interacts with system

4

Conversion of data into secret code

6

Request for information from a database

9

Software designed to harm computers