Across
1
Rules for data communication
5
Computer that provides services to others
6
Convert code into executable program
8
Security system blocking unauthorized access
9
Point where user interacts with system
Down
2
Program to access the internet
3
Computer model of a real-world system
4
Input device with letter and number keys
5
Series of commands for a computer
7
Software designed to harm computers
