Across
1
Security system blocking unauthorized access
6
Rules for data communication
7
Storage location for code
8
Wireless internet connection
Down
2
Interface for software to communicate
3
Temporary computer memory
4
Ordered collection of data elements
5
Computer model of a real-world system
9
Reusable block of code
