Across
1
Process of finding and fixing code errors
4
Security system blocking unauthorized access
5
Input device with letter and number keys
7
Global computer network
8
Wireless internet connection
Down
1
Organized collection of stored data
2
Convert code into executable program
3
Encode data to keep it secure
6
Data type with true or false values
