TECHNOLOGY

123456789
Across
  1. 2. usually consists of eight bits
  2. 3. is a plug-and-play interface that allows a computer to communicate with peripheral and other devices
  3. 4. what is a network security system used to stop unauthorized access
  4. 6. type of text style and size
  5. 8. process of converting data into a secret code for transmission over a public network
  6. 9. a computer program sent to gather information from your computer
Down
  1. 1. what is it called if people are nasty to you online?
  2. 5. copy (data) from one computer system to another typically over the Internet
  3. 7. real-time,synchronous, text-based communication via computer