wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types Of Interrupt

profile
Priyansh Shah
Jul 12, 2023
0 Likes
0 Discussions
29 Reads

Types of interrupts

There are two types of interrupts which are as follows −

 

Hardware interrupts

The interrupt signal generated from external devices and i/o devices are made interrupt to CPU when the instructions are ready.

 

For example − In a keyboard if we press a key to do some action this pressing of the keyboard generates a signal that is given to the processor to do action, such interrupts are called hardware interrupts.

 

Hardware interrupts are classified into two types which are as follows −

 

Maskable Interrupt − The hardware interrupts that can be delayed when a highest priority interrupt has occurred to the processor.

 

Non Maskable Interrupt − The hardware that cannot be delayed and immediately be serviced by the processor.

 

Software interrupts

The interrupt signal generated from internal devices and software programs need to access any system call then software interrupts are present.

 

Software interrupt is divided into two types. They are as follows −

 

Normal Interrupts − The interrupts that are caused by the software instructions are called software instructions.

 

Exception − Exception is nothing but an unplanned interruption while executing a program. For example − while executing a program if we got a value that is divided by zero is called an exception.


Comments ()


Sign in

Read Next

Data Acquisition in Cyber Forensics

Blog banner

Every body is beautiful

Blog banner

Smartsheet

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

social media issue

Blog banner

Types of Threads

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Understanding the 'Ambiverts'

Blog banner

Assignment 2

Blog banner

Social Engineering Attacks

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Computer security techniques

Blog banner

Fashion marketing in india

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

About myself

Blog banner

MORDERN UNIX SYSTEM

Blog banner

I/O Buffering

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Wedding photographer

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

A Deep Dive

Blog banner

Memory Partitioning

Blog banner

LISP - Library Management System

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner

Android Flashlight Application

Blog banner

CyberSecurity Color Wheel

Blog banner

Be kind person

Blog banner

How to use GIT & GITHUB

Blog banner

Not anti-social, but pro-solitude

Blog banner

GIS info about Bermuda Triangle

Blog banner

OS Assignment 3 Deadlock

Blog banner

Threads in OS

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Telegram and it's features

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

The War With Cold On Earth

Blog banner

Web Site

Blog banner

RACI model in IT services

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner