wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERRUPTS

profile
Mann Shah
Jul 12, 2023
0 Likes
0 Discussions
123 Reads

Virtually all computers provide a mechanism by which other modules (I/O, memory) may interrupt the normal sequencing of the processor.

Interrupts are provided primarily as a way to improve processor utilization.

With interrupts, the processor can be engaged in executing other instructions while an I/O operation is in progress.

When the external device becomes ready to be serviced, that is, when it is ready to accept more data from the processor, the I/O module for that external device sends an interrupt request signal to the processor. The processor responds by Suspending operation of the current program; branching off to a routine to service that particular I/O device, known as an interrupt handler; and resuming the original Execution after the device is serviced.

IN MICROPROCESSORS:-

Interrupt is the method of creating a temporary halt during program execution and allows peripheral devices to access the microprocessor. The microprocessor responds to that interrupt with an ISR (Interrupt Service Routine), which is a short program to instruct the microprocessor on how to handle the interrupt.

 

 


Comments ()


Sign in

Read Next

Functions of Operating System

Blog banner

Short note on expert system

Blog banner

Socket Programming in Java

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Hacking Mobile Platforms

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

SQL Injection

Blog banner

Virtual Machine

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Service stratergy principles

Blog banner

Be you

Blog banner

Satellite Based Positioning

Blog banner

Direct Memory Access

Blog banner

Electronic Funds Transfer

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Firewall

Blog banner

Embaded operating system

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

SPAM

Blog banner

Security Breaches in Stock market trading

Blog banner

Random Forests

Blog banner

Risk management in IT

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

On-Page SEO

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Data Exfiltration

Blog banner

Virtual memory

Blog banner

Big Data Architecture

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Layers Of Blockchain

Blog banner

Blockchain uses and use cases

Blog banner

Explain Multiprocessors

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

File management In Operating System

Blog banner

Online Games

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Threat management

Blog banner

Modern operating system

Blog banner

Virtual memory

Blog banner