Across
1
Security system blocking unauthorized access
6
Conversion of data into secret code
7
Input device with letter and number keys
Down
2
Programs and applications on a computer
3
Named storage location in code
4
Collection of web pages
5
Data type with true or false values
8
Main processor of a computer
