Across
1
Software designed to harm computers
5
Request for information from a database
7
Process of finding and fixing code errors
8
Encode data to keep it secure
9
Organized collection of stored data
10
Point where user interacts with system
Down
2
Storage location for code
3
Programs and applications on a computer
4
Security system blocking unauthorized access
6
Temporary storage for fast access
