Across
1
Rules for data communication
6
Global computer network
9
Software designed to harm computers
10
Capacity of a data connection
Down
2
Short-range wireless technology
3
Named storage location in code
4
Display screen for a computer
5
Conversion of data into secret code
7
Step-by-step problem-solving method
8
Reusable block of code
11
Process of finding and fixing code errors
