Computing
Across
- 2. graphics user interface
- 3. Longest way to hack a password
- 5. holds the results of any calculation
- 7. holds address for the next instruction
- 9. Address of the memory to be used in the MDR
Down
- 1. Ethical Hackers
- 4. Stores actively used data
- 6. Stores frequently used data and instructions
- 8. Stores BIOS