Across
1
Encode data to keep it secure
5
Point where user interacts with system
6
Short-range wireless technology
Down
2
Step-by-step problem-solving method
3
Main processor of a computer
4
Display screen for a computer
7
Information processed by a computer
8
Security system blocking unauthorized access
9
Function that calls itself
