Across
1
Process of finding and fixing code errors
5
Series of commands for a computer
6
Request for information from a database
7
Software designed to harm computers
10
Storage location for code
12
Portable personal computer
Down
2
Connected group of computers
3
Main processor of a computer
4
Security system blocking unauthorized access
8
Wireless internet connection
9
Pointer on a computer screen
11
Temporary storage for fast access
