wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PROCESS STATE:

profile
Apeksha Tank
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

Process states refer to the different operational states that a process can be in within an operating system.

These states typically include:

1. Running: The process is currently being executed by the processor.

2. Ready: The process is prepared to be executed and is waiting to be assigned to the processor.

3. Blocked: The process is unable to proceed because it is waiting for a particular event, such as input/output (I/O) completion or a resource allocation. It is temporarily halted until the event occurs.

4. Suspended: The process is temporarily removed from the main memory and placed in secondary storage, often due to limited resources or prioritization. It can be later swapped back into main memory for execution.

5. Terminated: The process has finished its execution and has been removed from the system.Its resources are released, and any associated data is cleaned up.

 These process states help the operating system efficiently manage and schedule tasks, allocate resources, and handle events within a computer system.

 The transition between these states is usually controlled by the operating system, based on events, priorities, and scheduling algorithms.


Comments ()


Sign in

Read Next

Different types of scam frauds

Blog banner

Key to success in Sports

Blog banner

Women empowerment

Blog banner

Caching windows

Blog banner

Travelling blog

Blog banner

ZOHO

Blog banner

Multithreading in Operating System

Blog banner

Virtual memory

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

10 Interesting facts you should know!!!

Blog banner

Network Security Risks

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Buffering

Blog banner

Multicore CPUs

Blog banner

american greatines

Blog banner

Types of email

Blog banner

Threading

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Cryptanalysis tool

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Operation system

Blog banner

File management

Blog banner

Kafka - A Framework

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Process states

Blog banner

How To Secure Operating Systems ?

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

IT security management

Blog banner

Types of Threads

Blog banner

Place to visit in pune

Blog banner

Wiretapping

Blog banner

E-learning

Blog banner

Deadlocks

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

From Model Mistakes to Metrics

Blog banner

OS assignment 3

Blog banner

GIS

Blog banner

Virtual Memory

Blog banner