Technology Review

Public|
7
6
3
5
2
1
4

Across

1

Pointer on a computer screen

4

Request for information from a database

5

Capacity of a data connection

Down

1

Convert code into executable program

2

Ordered collection of data elements

3

Encode data to keep it secure

6

Online data storage and computing

7

Security system blocking unauthorized access