Across
1
Computer model of a real-world system
5
Software designed to harm computers
9
Request for information from a database
10
Named storage location in code
Down
2
Wired networking technology
3
Convert code into executable program
4
Function that calls itself
6
Security system blocking unauthorized access
7
Short-range wireless technology
8
Wireless internet connection
