Across
1
Software designed to harm computers
4
Series of commands for a computer
6
Data type with true or false values
8
Temporary storage for fast access
9
Input device with letter and number keys
10
Security system blocking unauthorized access
Down
2
Point where user interacts with system
3
Instructions written for a computer
5
Collection of web pages
7
Temporary computer memory
