Across
1
Security system blocking unauthorized access
3
Error in computer code
6
Main processor of a computer
7
Process of finding and fixing code errors
8
Physical components of a computer
9
Reusable block of code
Down
2
Portable personal computer
3
Data type with true or false values
4
Rules for data communication
5
Conversion of data into secret code
