Across
1
Conversion of data into secret code
5
Named storage location in code
7
Security system blocking unauthorized access
8
Organized collection of stored data
9
Input device with letter and number keys
10
Encode data to keep it secure
Down
2
Software designed to harm computers
3
Computer model of a real-world system
4
Pointer on a computer screen
6
Short-range wireless technology
11
Connected group of computers
