Across
1
Rules for data communication
5
Request for information from a database
6
Process of finding and fixing code errors
9
Organized collection of stored data
10
Software designed to harm computers
Down
2
Temporary computer memory
3
Conversion of data into secret code
4
Temporary storage for fast access
6
Information processed by a computer
7
Portable personal computer
8
Convert code into executable program
