wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types Of Interrupt

profile
Priyansh Shah
Jul 12, 2023
0 Likes
0 Discussions
29 Reads

Types of interrupts

There are two types of interrupts which are as follows −

 

Hardware interrupts

The interrupt signal generated from external devices and i/o devices are made interrupt to CPU when the instructions are ready.

 

For example − In a keyboard if we press a key to do some action this pressing of the keyboard generates a signal that is given to the processor to do action, such interrupts are called hardware interrupts.

 

Hardware interrupts are classified into two types which are as follows −

 

Maskable Interrupt − The hardware interrupts that can be delayed when a highest priority interrupt has occurred to the processor.

 

Non Maskable Interrupt − The hardware that cannot be delayed and immediately be serviced by the processor.

 

Software interrupts

The interrupt signal generated from internal devices and software programs need to access any system call then software interrupts are present.

 

Software interrupt is divided into two types. They are as follows −

 

Normal Interrupts − The interrupts that are caused by the software instructions are called software instructions.

 

Exception − Exception is nothing but an unplanned interruption while executing a program. For example − while executing a program if we got a value that is divided by zero is called an exception.


Comments ()


Sign in

Read Next

Explain website hacking issues

Blog banner

Paid Email

Blog banner

Broken Authentication Attacks

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

E-mail security

Blog banner

Virtual memory

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Google App Engine

Blog banner

Expert System In AI

Blog banner

Cache memory

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Steganography and Steganalysis

Blog banner

A Deep Dive

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

How To Secure Operating Systems ?

Blog banner

Deadlock

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Concurrency and Deadlocks

Blog banner

A little bit of salt is all the hash needs!

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Some web vulnerabilities

Blog banner

Swiggi

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Benefits of Yoga

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Intrusion Detection System

Blog banner

Starvation

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Direct memory access (DMA)

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Deadlocks in Operating System

Blog banner

Modern Operating Systems

Blog banner

Cache memory

Blog banner

Characteristics of Etherum

Blog banner

Predictive Analysis - Ek Overview

Blog banner