wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PROCESS STATE:

profile
Apeksha Tank
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

Process states refer to the different operational states that a process can be in within an operating system.

These states typically include:

1. Running: The process is currently being executed by the processor.

2. Ready: The process is prepared to be executed and is waiting to be assigned to the processor.

3. Blocked: The process is unable to proceed because it is waiting for a particular event, such as input/output (I/O) completion or a resource allocation. It is temporarily halted until the event occurs.

4. Suspended: The process is temporarily removed from the main memory and placed in secondary storage, often due to limited resources or prioritization. It can be later swapped back into main memory for execution.

5. Terminated: The process has finished its execution and has been removed from the system.Its resources are released, and any associated data is cleaned up.

 These process states help the operating system efficiently manage and schedule tasks, allocate resources, and handle events within a computer system.

 The transition between these states is usually controlled by the operating system, based on events, priorities, and scheduling algorithms.


Comments ()


Sign in

Read Next

Importance of education

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Importance Of Yoga.

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

THE DESIRE OF MANY

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

IOT Hacking Techniques

Blog banner

Multiprocessor and scheduling

Blog banner

Scheduling

Blog banner

Device driver

Blog banner

DNS Cache

Blog banner

Evolution of OS

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

I/O buffer and its techniques

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

OS Assignment 3 Deadlock

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

Harsh Rathod

Blog banner

Tracking Emails & Email Crimes

Blog banner

Different types of scam frauds

Blog banner

Hacking Mobile Platforms

Blog banner

My Favorite Sportsperson

Blog banner

Oracle Corporation

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Career v/s Job : Choose your passion

Blog banner

LinkedIn

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Big O Notation

Blog banner

OS Assignment 1

Blog banner

Pandas Matrix Applications

Blog banner

Operating Systems

Blog banner

Some web vulnerabilities

Blog banner

CyberSecurity Color Wheel

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Friendship

Blog banner

Music is life

Blog banner

Cache Memory

Blog banner