Across
1
Security system blocking unauthorized access
5
Temporary computer memory
6
Wired networking technology
7
Data type with true or false values
10
Physical components of a computer
Down
2
Computer model of a real-world system
3
Step-by-step problem-solving method
4
Storage location for code
8
Instructions written for a computer
9
Collection of web pages
