Across
1
Security system blocking unauthorized access
5
Conversion of data into secret code
6
Convert code into executable program
7
Step-by-step problem-solving method
8
Capacity of a data connection
Down
2
Software designed to harm computers
3
Set of instructions for a computer
4
Short-range wireless technology
9
Programs and applications on a computer
