3. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk, is known as
Correct Answer: are legitimate programs that allow unauthorized access
7. What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?