Across
1
Input device with letter and number keys
5
Storage medium for digital data
6
Wireless internet connection
7
Security system blocking unauthorized access
9
Conversion of data into secret code
Down
2
Storage location for code
3
Capacity of a data connection
4
Global computer network
8
Data type with true or false values
10
Step-by-step problem-solving method
