Answer:
Operating system is the software that is used to control different hardware of computers and handle scheduled tasks.
It also handles the interrupts from some external devices, or from some software. The interrupts are handled through Interrupt service routine. When some external event occurs the following steps has been taken by OS to perform the operation
- In first step, an external event has been occurred, and request to the cpu to perform operation.
- This request invoke ISR (Interrupt service routine), to perform the operation.
- The interrupts are stored in stack on the priority basis.
- The CPU performs the operation on Interrupt as per request of ISR.
- After Completing operation, CPU return to its initial task.
Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
A. yield to the car on your right
B- find and replace can replace any word in the document with another.
Some options are add to dictionary, ignore once, ignore all, autocorrect, change, and change all.