Across
1
Programs and applications on a computer
6
Convert code into executable program
7
Temporary computer memory
9
Rules for data communication
Down
2
Portable personal computer
3
Temporary storage for fast access
4
Computer model of a real-world system
5
Security system blocking unauthorized access
6
Online data storage and computing
8
Software designed to harm computers
