wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PROCESS STATE:

profile
Apeksha Tank
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

Process states refer to the different operational states that a process can be in within an operating system.

These states typically include:

1. Running: The process is currently being executed by the processor.

2. Ready: The process is prepared to be executed and is waiting to be assigned to the processor.

3. Blocked: The process is unable to proceed because it is waiting for a particular event, such as input/output (I/O) completion or a resource allocation. It is temporarily halted until the event occurs.

4. Suspended: The process is temporarily removed from the main memory and placed in secondary storage, often due to limited resources or prioritization. It can be later swapped back into main memory for execution.

5. Terminated: The process has finished its execution and has been removed from the system.Its resources are released, and any associated data is cleaned up.

 These process states help the operating system efficiently manage and schedule tasks, allocate resources, and handle events within a computer system.

 The transition between these states is usually controlled by the operating system, based on events, priorities, and scheduling algorithms.


Comments ()


Sign in

Read Next

How To Secure Operating Systems ?

Blog banner

A small world of Sockets

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Introduction my self

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

MY FIRST BLOG?

Blog banner

FIREWALL

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Hacking

Blog banner

GIS REMOTE SENSING

Blog banner

Place to visit in pune

Blog banner

Memory Management in Operating System

Blog banner

IP Address

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Security issues

Blog banner

Memory management

Blog banner

Why we fail after giving 100% ?

Blog banner

Virtual Memory

Blog banner

Deadlock and Starvation

Blog banner

K-means use cases

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

What is M-commerce and how it's work

Blog banner

Memory

Blog banner

What is metaverse?

Blog banner

INTRODUCTION TO C#

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

How Cyber Forensics use in AI

Blog banner

File Sharing

Blog banner

Google

Blog banner

IoT Evolution

Blog banner

Remote Work in 2026

Blog banner

Memory Management

Blog banner

Threat management

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Women Empowerment

Blog banner

Functions of operating system

Blog banner

Malware Defense

Blog banner

USPS mail

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

BLOCKCHAIN MACHANISM

Blog banner