wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types Of Interrupt

profile
Priyansh Shah
Jul 12, 2023
0 Likes
0 Discussions
29 Reads

Types of interrupts

There are two types of interrupts which are as follows −

 

Hardware interrupts

The interrupt signal generated from external devices and i/o devices are made interrupt to CPU when the instructions are ready.

 

For example − In a keyboard if we press a key to do some action this pressing of the keyboard generates a signal that is given to the processor to do action, such interrupts are called hardware interrupts.

 

Hardware interrupts are classified into two types which are as follows −

 

Maskable Interrupt − The hardware interrupts that can be delayed when a highest priority interrupt has occurred to the processor.

 

Non Maskable Interrupt − The hardware that cannot be delayed and immediately be serviced by the processor.

 

Software interrupts

The interrupt signal generated from internal devices and software programs need to access any system call then software interrupts are present.

 

Software interrupt is divided into two types. They are as follows −

 

Normal Interrupts − The interrupts that are caused by the software instructions are called software instructions.

 

Exception − Exception is nothing but an unplanned interruption while executing a program. For example − while executing a program if we got a value that is divided by zero is called an exception.


Comments ()


Sign in

Read Next

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Dancing Classes In Mumbai

Blog banner

Memory Management

Blog banner

Modern operating system

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Threads in OS

Blog banner

Evolution of the Microprocesor

Blog banner

Service transition principles

Blog banner

Cryptanalysis tool

Blog banner

operating system

Blog banner

How Does SSO Works

Blog banner

Memory Management - operating system

Blog banner

WINDOWS I/ O

Blog banner

Install Ubuntu in Vmware

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Data Security must be your Priority!

Blog banner

Short note on expert system

Blog banner

Evolution of Operating system

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Deadlock and starvation

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

How I use google in my daily life

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

John Titor: The Time Traveler

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Importance of Education

Blog banner

Why we fail after giving 100% ?

Blog banner

Critical success factors

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

What are Tenders its various types

Blog banner

Modern operating system

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Deadlock

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Deadlock and starvation

Blog banner

A buffer overflow

Blog banner

Threads

Blog banner