Technology Challenge

Public|
2
6
3
1
5
11
12
4
10
8
7
9

Across

1

Software designed to harm computers

4

Instructions written for a computer

6

Online data storage and computing

7

Input device with letter and number keys

10

Wireless internet connection

Down

2

Request for information from a database

3

Temporary storage for fast access

5

Collection of web pages

8

Temporary computer memory

9

Error in computer code

11

Capacity of a data connection

12

Conversion of data into secret code