Across
1
Input device with letter and number keys
5
Rules for data communication
7
Step-by-step problem-solving method
Down
2
Online data storage and computing
3
Collection of web pages
4
Encode data to keep it secure
6
Pointer on a computer screen
8
Security system blocking unauthorized access
