Across
1
Security system blocking unauthorized access
5
Encode data to keep it secure
6
Collection of web pages
Down
2
Short-range wireless technology
3
Convert code into executable program
4
Ordered collection of data elements
7
Main processor of a computer
8
Step-by-step problem-solving method
