Across
1
Wireless internet connection
3
Rules for data communication
6
Request for information from a database
7
Portable personal computer
8
Global computer network
Down
2
Storage location for code
4
Display screen for a computer
5
Conversion of data into secret code
9
Instructions written for a computer
