Across
1
Data type with true or false values
3
Security system blocking unauthorized access
4
Series of commands for a computer
5
Encode data to keep it secure
6
Rules for data communication
9
Error in computer code
10
Convert code into executable program
Down
2
Connected group of computers
3
Reusable block of code
4
Computer model of a real-world system
7
Input device with letter and number keys
8
Conversion of data into secret code
11
Storage location for code
12
Named storage location in code
