Across
1
Security system blocking unauthorized access
5
Storage medium for digital data
7
Computer model of a real-world system
8
Software designed to harm computers
9
Physical components of a computer
Down
2
Capacity of a data connection
3
Set of instructions for a computer
4
Conversion of data into secret code
6
Rules for data communication
10
Request for information from a database
