Technology Challenge

公开|
2
6
5
4
3
1
7

横向

1

Encode data to keep it secure

5

Convert code into executable program

6

Portable personal computer

7

Input device with letter and number keys

纵向

2

Named storage location in code

3

Information processed by a computer

4

Security system blocking unauthorized access

5

Instructions written for a computer