Across
1
Software designed to harm computers
4
Rules for data communication
5
Security system blocking unauthorized access
10
Collection of web pages
11
Storage location for code
Down
2
Short-range wireless technology
3
Encode data to keep it secure
6
Data type with true or false values
7
Ordered collection of data elements
8
Programs and applications on a computer
9
Convert code into executable program
12
Online data storage and computing
