wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types Of Interrupt

profile
Priyansh Shah
Jul 12, 2023
0 Likes
0 Discussions
29 Reads

Types of interrupts

There are two types of interrupts which are as follows −

 

Hardware interrupts

The interrupt signal generated from external devices and i/o devices are made interrupt to CPU when the instructions are ready.

 

For example − In a keyboard if we press a key to do some action this pressing of the keyboard generates a signal that is given to the processor to do action, such interrupts are called hardware interrupts.

 

Hardware interrupts are classified into two types which are as follows −

 

Maskable Interrupt − The hardware interrupts that can be delayed when a highest priority interrupt has occurred to the processor.

 

Non Maskable Interrupt − The hardware that cannot be delayed and immediately be serviced by the processor.

 

Software interrupts

The interrupt signal generated from internal devices and software programs need to access any system call then software interrupts are present.

 

Software interrupt is divided into two types. They are as follows −

 

Normal Interrupts − The interrupts that are caused by the software instructions are called software instructions.

 

Exception − Exception is nothing but an unplanned interruption while executing a program. For example − while executing a program if we got a value that is divided by zero is called an exception.


Comments ()


Sign in

Read Next

"THINGS TO REMEMBER WHEN YOU'RE AT YOUR LOWEST"

Blog banner

INTERNET

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Virtual memory in windows

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

CONCURRENCY

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Teenagers of Today

Blog banner

Memory management

Blog banner

Bharat Maps

Blog banner

Artical on FreshBooks

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Types of Malware in Cyber Security

Blog banner

Service Transition Process in ITSM

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

EID UL FITR

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Direct memory access

Blog banner

Reconnaissance

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Hello World

Blog banner

MySQL

Blog banner

All you need to know about Cassandra

Blog banner

I/O buffer and its techniques

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Importance Of Education.

Blog banner

Dancing Classes In Mumbai

Blog banner

What is a geographic information system (GIS)?

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Online Games

Blog banner

File Management In OS

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Harsh Rathod

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

How Cyber Forensics use in AI

Blog banner

What is semaphore in operating system?

Blog banner

Memory Management

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Deadlock in operating system

Blog banner

Tools to support CSI activities

Blog banner