Across
1
Encode data to keep it secure
5
Convert code into executable program
6
Portable personal computer
7
Input device with letter and number keys
Down
2
Named storage location in code
3
Information processed by a computer
4
Security system blocking unauthorized access
5
Instructions written for a computer
