Across
1
Security system blocking unauthorized access
4
Conversion of data into secret code
6
Request for information from a database
8
Temporary computer memory
9
Collection of web pages
Down
2
Wireless internet connection
3
Process of finding and fixing code errors
5
Instructions written for a computer
7
Program to access the internet
