Across
1
Display screen for a computer
5
Wireless internet connection
7
Input device with letter and number keys
8
Encode data to keep it secure
Down
2
Connected group of computers
3
Software designed to harm computers
4
Information processed by a computer
6
Step-by-step problem-solving method
9
Request for information from a database
