Across
1
Set of instructions for a computer
4
Security system blocking unauthorized access
5
Conversion of data into secret code
7
Temporary storage for fast access
Down
2
Step-by-step problem-solving method
3
Physical components of a computer
6
Rules for data communication
8
Convert code into executable program
9
Instructions written for a computer
