Technology Review

Public|
6
7
9
8
4
3
2
5
1
10

Across

1

Encode data to keep it secure

1

Conversion of data into secret code

4

Named storage location in code

7

Request for information from a database

8

Storage location for code

10

Connected group of computers

Down

2

Display screen for a computer

3

Point where user interacts with system

5

Global computer network

6

Collection of web pages

9

Programs and applications on a computer