Across
1
Conversion of data into secret code
6
Named storage location in code
7
Connected group of computers
8
Portable personal computer
Down
2
Collection of web pages
3
Moving images created digitally
4
Security system blocking unauthorized access
5
Wired networking technology
9
Short-range wireless technology
10
Software designed to harm computers
