Question
a.
maskable & nonmaskable interrupts
b.
blocked & nonmaskable interrupts
c.
maskable & blocked interrupts
d.
none of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In general the two interrupt request lines are :
Similar Questions
Discover Related MCQs
Q. The _________ are reserved for events such as unrecoverable memory errors.
View solution
Q. The ________ can be turned off by the CPU before the execution of critical instruction sequences that must not be interrupted.
View solution
Q. The __________ is used by device controllers to request service.
View solution
Q. The interrupt vector contains :
View solution
Q. Division by zero, accessing a protected or non existent memory address, or attempting to execute a privileged instruction from user mode are all categorized as ________
View solution
Q. For large data transfers, _________ is used.
View solution
Q. A character stream device transfers :
View solution
Q. A block device transfers :
View solution
Q. A dedicated device is :
View solution
Q. A keyboard is an example of a device that is accessed through a __________ interface.
View solution
Q. In polling :
View solution
Q. A non blocking system call _________________
View solution
Q. An asynchronous call :
View solution
Q. Buffering is done to :
View solution
Q. Caching is ________ spooling.
View solution
Q. Caching :
View solution
Q. Spooling :
View solution
Q. The ________ keeps state information about the use of I/O components.
View solution
Q. The kernel data structures include :
View solution
Q. Windows NT uses a __________ implementation for I/O.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!

Cyber Security
Understand the fundamentals of safeguarding digital assets with our Cyber Security...

Software Engineering
Learn about the systematic approach to developing software with our Software...