Across
1
Rules for data communication
5
Computer model of a real-world system
6
Temporary storage for fast access
7
Moving images created digitally
8
Display screen for a computer
9
Encode data to keep it secure
Down
2
Physical components of a computer
3
Data type with true or false values
4
Security system blocking unauthorized access
10
Series of commands for a computer
