wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types Of Interrupt

profile
Priyansh Shah
Jul 12, 2023
0 Likes
0 Discussions
29 Reads

Types of interrupts

There are two types of interrupts which are as follows −

 

Hardware interrupts

The interrupt signal generated from external devices and i/o devices are made interrupt to CPU when the instructions are ready.

 

For example − In a keyboard if we press a key to do some action this pressing of the keyboard generates a signal that is given to the processor to do action, such interrupts are called hardware interrupts.

 

Hardware interrupts are classified into two types which are as follows −

 

Maskable Interrupt − The hardware interrupts that can be delayed when a highest priority interrupt has occurred to the processor.

 

Non Maskable Interrupt − The hardware that cannot be delayed and immediately be serviced by the processor.

 

Software interrupts

The interrupt signal generated from internal devices and software programs need to access any system call then software interrupts are present.

 

Software interrupt is divided into two types. They are as follows −

 

Normal Interrupts − The interrupts that are caused by the software instructions are called software instructions.

 

Exception − Exception is nothing but an unplanned interruption while executing a program. For example − while executing a program if we got a value that is divided by zero is called an exception.


Comments ()


Sign in

Read Next

I/O Buffering

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

RAID - LEVELS OF RAID

Blog banner

Principles of Service Operation

Blog banner

Data carving - using hex editor

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Disk scheduling

Blog banner

Emerging threats in cyber Forensics

Blog banner

How to lose belly fat

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Threat management

Blog banner

E-mail security

Blog banner

BrainGate Technology

Blog banner

GIS in Disaster Management

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Threads

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

security requirements for safe e-payment

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

'Positivity in life'

Blog banner

Google classroom

Blog banner

Buffering

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Emailing the merger document

Blog banner

Question

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

DISK SCHEDULING

Blog banner

Cache Memory in Operating Systems

Blog banner

Functions Of Operating Systems

Blog banner

Consumer to consumer business mode

Blog banner

Data Mapping

Blog banner

Fitness

Blog banner

Memory Management

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

PYTHON

Blog banner

File Organization and Access

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Starvation

Blog banner

History of Money

Blog banner