Across
1
Encode data to keep it secure
1
Conversion of data into secret code
4
Named storage location in code
7
Request for information from a database
8
Storage location for code
10
Connected group of computers
Down
2
Display screen for a computer
3
Point where user interacts with system
5
Global computer network
6
Collection of web pages
9
Programs and applications on a computer
