Across
1
Software designed to harm computers
5
Input device with letter and number keys
8
Conversion of data into secret code
11
Function that calls itself
12
Wired networking technology
Down
2
Connected group of computers
3
Information processed by a computer
4
Physical components of a computer
6
Encode data to keep it secure
7
Rules for data communication
9
Temporary storage for fast access
10
Request for information from a database
13
Moving images created digitally
