Technology Challenge

Public|
2
6
5
4
3
1
7

Across

1

Encode data to keep it secure

5

Convert code into executable program

6

Portable personal computer

7

Input device with letter and number keys

Down

2

Named storage location in code

3

Information processed by a computer

4

Security system blocking unauthorized access

5

Instructions written for a computer