wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process in OS

profile
Srushti Chaurasia
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

WHAT IS A PROCESS?

When we write a program in high level language, it has to be converted into binary code with the help of compiler to make it understandable for the machine and now the program is ready for execution but it is not enough to tell the computer what it wants to do. So the operating system will help in loading that executable program into the memory and allocate its resources and then the program will begin its execution. The program till the time just sits there without doing anything but the moment it begins execution, at that instance we call that program as process.

When a program,module or function is in execution, it is called a process. When we write a computer program,it is in text file and when we execute this computer program in the main memory it becomes a process. When a program is loaded into memory and it becomes a process and it performs all the tasks mentioned in the program, it can be divided into four components stack,heap,text and data.

 The layout of process inside main memory contains‐

• Stack contains the temporary data such as functions, parameters, local variables.

• Heap provides dynamically allocated memory to process only during runtime.

• Data contains global variables and static variables

• Text includes the current activity representation by the value of program counter and the contents of processor registers

 

 

 


Comments ()


Sign in

Read Next

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Deadlock

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Data Visualization

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Rain bow

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Evolution of operating systems

Blog banner

KASHMIR TRIPS

Blog banner

Self managing devices

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Domain Name System

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Threads

Blog banner

The Laws of Karma

Blog banner

Remote Work in 2026

Blog banner

Jio .....A Revolution ?? ??

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

"Mahakali cave"

Blog banner

Memory management

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

VIRTUAL MACHINES

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

PERSONAL STORIES

Blog banner

RAID

Blog banner

A small world of Sockets

Blog banner

Concurrency and Deadlocks

Blog banner

Traveling

Blog banner

K-means use cases

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Security in Cloud Computing

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

S-Tool : Steganography

Blog banner

LINUX

Blog banner

Virtual memory

Blog banner

Scheduling

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

Ethical Hacking

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner