Technology Lesson

Public|
2
3
1
5
6
7
4
9
8

Across

1

Security system blocking unauthorized access

4

Conversion of data into secret code

6

Request for information from a database

8

Temporary computer memory

9

Collection of web pages

Down

2

Wireless internet connection

3

Process of finding and fixing code errors

5

Instructions written for a computer

7

Program to access the internet