Across
1
Security system blocking unauthorized access
5
Instructions written for a computer
6
Pointer on a computer screen
7
Convert code into executable program
8
Connected group of computers
9
Encode data to keep it secure
10
Computer model of a real-world system
Down
2
Capacity of a data connection
3
Conversion of data into secret code
4
Ordered collection of data elements
6
Online data storage and computing
