3.
MFC is used to . . . . . . . .

5.
How is a privilege exception dealt with?

6.
The most efficient method followed by computers to multiply two unsigned numbers is . . . . . . . .

7.
From amongst the following given scenarios determine the right one to justify interrupt mode of data transfer.
i) Bulk transfer of several kilo-byte
ii) Moderately large data transfer of more than 1kb
iii) Short events like mouse action
iv) Keyboard inputs