Across
1
Information processed by a computer
3
Request for information from a database
6
Security system blocking unauthorized access
7
Named storage location in code
Down
2
Software designed to harm computers
4
Online data storage and computing
5
Ordered collection of data elements
8
Pointer on a computer screen
9
Conversion of data into secret code
10
Wireless internet connection
11
Rules for data communication
