Across
1
Software designed to harm computers
3
Encode data to keep it secure
6
Series of commands for a computer
7
Reusable block of code
8
Programs and applications on a computer
Down
2
Storage location for code
4
Temporary storage for fast access
5
Connected group of computers
9
Temporary computer memory
