wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

Technical Challenges and Directions for Digital Forensics

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

A Heartfelt Act of Kindness

Blog banner

Cache Memory in Operating Systems

Blog banner

Expert System In AI

Blog banner

Photography

Blog banner

Computer Security

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Data Visualization in Decision-Making

Blog banner

Social media

Blog banner

Layers Of Blockchain

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Race Condition

Blog banner

How Cyber Forensics use in AI

Blog banner

Access management

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Zoho

Blog banner

Deadlocks in operating system

Blog banner

Indian Culture and Tradition

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Regression Analysis

Blog banner

K-means use cases

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Importance Of Education.

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Yoga in INDIA and ABROAD

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Raid and levels of raid.

Blog banner

Bit Coins

Blog banner

VIRTUAL MACHINES

Blog banner

How to feel Happy everyday day

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

TRAIN TRAVELING

Blog banner

A Deep Dive

Blog banner

THE ACTORS LIFE

Blog banner

RAID - LEVELS OF RAID

Blog banner

Blockchain technology: security risk and prevention

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Proof-of-Stake (PoS)

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner