Across
1
Security system blocking unauthorized access
6
Set of instructions for a computer
7
Storage location for code
8
Request for information from a database
9
Physical components of a computer
Down
2
Portable personal computer
3
Named storage location in code
4
Software designed to harm computers
5
Short-range wireless technology
