Glenys Lim Yi Xuan 8 Gamma

123456789
Across
  1. 1. is the brain of the computer.
  2. 4. The name of your computer.
  3. 5. What you use to control your computer.
  4. 7. Where you store informations.
  5. 8. is what hackers are trying to find.
  6. 9. What you cover to prevent hacker see you through your computer.
Down
  1. 2. How you start your computer.
  2. 3. Which side of your computer when you close it.
  3. 6. How you start an email.
  4. 8. What is on your computer screen.