2. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
5. A disk scheduling algorithm in an operating system causes the disk arm to move back and forth across the disk surface in order to service all requests in its path. This is a
Correct Answer: are legitimate programs that allow unauthorized access
8. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?