Across
1
Software designed to harm computers
5
Capacity of a data connection
6
Wireless internet connection
8
Set of instructions for a computer
11
Rules for data communication
Down
2
Temporary storage for fast access
3
Security system blocking unauthorized access
4
Point where user interacts with system
7
Programming language for web browsers
9
Storage medium for digital data
10
Conversion of data into secret code
