Across
1
Encode data to keep it secure
5
Short-range wireless technology
6
Instructions written for a computer
10
Wireless internet connection
Down
2
Capacity of a data connection
3
Pointer on a computer screen
4
Point where user interacts with system
7
Storage location for code
8
Programs and applications on a computer
9
Security system blocking unauthorized access
