1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
4 years ago
5

• Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?

Computers and Technology
1 answer:
sdas [7]4 years ago
5 0

Answer:

Operating system is the software that is used to control different hardware of computers and handle scheduled tasks.

It also handles the interrupts from some external devices, or from some software. The interrupts are handled through Interrupt service routine. When some external event occurs the following steps has been taken by OS to perform the operation

  1. In first step, an external event has been occurred, and request to the cpu to perform operation.
  2. This request invoke ISR (Interrupt service routine), to perform the operation.
  3. The interrupts are stored in stack on the priority basis.
  4. The CPU performs the operation on Interrupt as per request of ISR.
  5. After Completing operation, CPU return to its initial task.  

You might be interested in
Which key removes all data from an active cell with one click? A. Esc B. Delete C. Tab D. F2
bija089 [108]
The answer is B. Delete
6 0
3 years ago
Read 2 more answers
Which data type is 2.5?
Phoenix [80]

2.5 is a float.

Float stands for floating point. Floating point types are numbers with decimal places. I hope this helps!

6 0
3 years ago
In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
klasskru [66]

Answer:

The correct answer to the following question will be "Guest Integration Service".

Explanation:

Integration resources are often a packaged package of applications that enhances connectivity between the hosting network as well as the virtual device when enabled throughout the VM.

  • This also seamlessly integrates time between both the visitors and server OS and could provide a pulse and folder compatibility.
  • It offers a Hyper-V network interface for unidirectional copying of data from and to another virtual machine.

This package of tools will help to fix compatibility problems. So, that is the right answer.

8 0
4 years ago
Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
S_A_V [24]
Router........................
6 0
3 years ago
Give 5 uses of software and hardware.
Annette [7]
Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page is computer hardware. The Internet browser that allowed you to visit this page and the operating system that the browser is running on is considered software.

All software utilizes at least one hardware device to operate. For example, a video game, which is software, uses the computer processor (CPU), memory (RAM), hard drive, and video card to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents.

In a computer, hardware is what makes a computer work. A CPU processes information and that information can be stored in RAM or on a hard drive. A sound card can provide sound to speakers and a video card can provide an image to a monitor. All of this is hardware.

7 0
3 years ago
Other questions:
  • Smartphones store their operating system software in ________.
    11·1 answer
  • ________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of the
    5·1 answer
  • The primary difference between a DVD and a CD is that one is read and written using optics while the other uses magnets.
    12·2 answers
  • PLEASE HELP!!!
    12·1 answer
  • An individual posing as an online gamer accesses information stored in an unsuspecting user’s computer by placing a program in h
    11·1 answer
  • Ram is also called __________________________________________________
    11·1 answer
  • Resumen sobres el correo electrónico​
    6·1 answer
  • What is presentation software in bussiness used for
    9·1 answer
  • From which latin word the word computer is derived​
    7·1 answer
  • Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applicati
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!