Across
1
Software designed to harm computers
5
Set of instructions for a computer
6
Temporary storage for fast access
8
Capacity of a data connection
10
Wired networking technology
11
Step-by-step problem-solving method
Down
2
Convert code into executable program
3
Named storage location in code
4
Request for information from a database
7
Encode data to keep it secure
9
Information processed by a computer
