Across
1
Point where user interacts with system
6
Ordered collection of data elements
8
Instructions written for a computer
9
Connected group of computers
Down
2
Encode data to keep it secure
2
Conversion of data into secret code
3
Series of commands for a computer
4
Software designed to harm computers
5
Process of finding and fixing code errors
7
Request for information from a database
10
Storage location for code
