wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

INTERRUPTS

profile
Mann Shah
Jul 12, 2023
0 Likes
0 Discussions
123 Reads

Virtually all computers provide a mechanism by which other modules (I/O, memory) may interrupt the normal sequencing of the processor.

Interrupts are provided primarily as a way to improve processor utilization.

With interrupts, the processor can be engaged in executing other instructions while an I/O operation is in progress.

When the external device becomes ready to be serviced, that is, when it is ready to accept more data from the processor, the I/O module for that external device sends an interrupt request signal to the processor. The processor responds by Suspending operation of the current program; branching off to a routine to service that particular I/O device, known as an interrupt handler; and resuming the original Execution after the device is serviced.

IN MICROPROCESSORS:-

Interrupt is the method of creating a temporary halt during program execution and allows peripheral devices to access the microprocessor. The microprocessor responds to that interrupt with an ISR (Interrupt Service Routine), which is a short program to instruct the microprocessor on how to handle the interrupt.

 

 


Comments ()


Sign in

Read Next

Caching windows

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Process State

Blog banner

A buffer overflow

Blog banner

Busted : Common Web Security Myths

Blog banner

Blockchain

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Shoulders

Blog banner

MY FIRST BLOG?

Blog banner

My First Dream Bike

Blog banner

What is M-commerce and how it's work

Blog banner

Memory Management in Operating System

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Heart Fulness Meditation

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

File and File System Structure

Blog banner

Understanding - Proof of Work!

Blog banner

Virtual memory

Blog banner

Deadlocks in Operating System

Blog banner

Monday. com App

Blog banner

Understanding the 'Ambiverts'

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Electronic Funds Transfer

Blog banner

Fault Tolerance in an Operating System

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Mariana Trench: The deepest depths

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

HR Automation : Need of the hour

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Memory management

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Online Games

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Reconnaissance

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

File Management

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner