Across
1
Security system blocking unauthorized access
5
Input device with letter and number keys
6
Instructions written for a computer
7
Storage medium for digital data
Down
2
Collection of web pages
3
Portable personal computer
4
Encode data to keep it secure
4
Conversion of data into secret code
