Across
1
Security system blocking unauthorized access
6
Connected group of computers
7
Online data storage and computing
8
Main processor of a computer
9
Request for information from a database
10
Wireless internet connection
Down
2
Convert code into executable program
3
Conversion of data into secret code
4
Software designed to harm computers
5
Rules for data communication
