Across
1
Online data storage and computing
3
Software designed to harm computers
4
Encode data to keep it secure
4
Conversion of data into secret code
5
Rules for data communication
9
Moving images created digitally
11
Request for information from a database
Down
2
Short-range wireless technology
6
Point where user interacts with system
7
Security system blocking unauthorized access
8
Error in computer code
10
Temporary storage for fast access
12
Data type with true or false values
