This document discusses interrupts, exceptions, and system calls in operating systems as well as concepts of protection levels including descriptor, current, requested, and effective privilege levels. It also asks whether a system can crash while running at current privilege level 3 and why design driven design is used.