Technology Challenge

Public|
4
5
9
1
2
3
6
7
8

Across

1

Software designed to harm computers

3

Encode data to keep it secure

6

Series of commands for a computer

7

Reusable block of code

8

Programs and applications on a computer

Down

2

Storage location for code

4

Temporary storage for fast access

5

Connected group of computers

9

Temporary computer memory