Across
1
Ordered collection of data elements
3
Online data storage and computing
5
Software designed to harm computers
7
Named storage location in code
9
Conversion of data into secret code
Down
2
Physical components of a computer
4
Security system blocking unauthorized access
6
Request for information from a database
8
Temporary storage for fast access
