wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process in OS

profile
Srushti Chaurasia
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

WHAT IS A PROCESS?

When we write a program in high level language, it has to be converted into binary code with the help of compiler to make it understandable for the machine and now the program is ready for execution but it is not enough to tell the computer what it wants to do. So the operating system will help in loading that executable program into the memory and allocate its resources and then the program will begin its execution. The program till the time just sits there without doing anything but the moment it begins execution, at that instance we call that program as process.

When a program,module or function is in execution, it is called a process. When we write a computer program,it is in text file and when we execute this computer program in the main memory it becomes a process. When a program is loaded into memory and it becomes a process and it performs all the tasks mentioned in the program, it can be divided into four components stack,heap,text and data.

 The layout of process inside main memory contains‐

• Stack contains the temporary data such as functions, parameters, local variables.

• Heap provides dynamically allocated memory to process only during runtime.

• Data contains global variables and static variables

• Text includes the current activity representation by the value of program counter and the contents of processor registers

 

 

 


Comments ()


Sign in

Read Next

RAID and It's Levels

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

GIS Topography

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

The Right way of cooking

Blog banner

The Features of Blockchain

Blog banner

Processing Crime and Incident Scenes

Blog banner

Deadlock

Blog banner

Importance of education

Blog banner

Vulnerability Assessment

Blog banner

Mendeley (management software)

Blog banner

Components of GIS

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Big Data Architecture

Blog banner

A Journey By Train

Blog banner

How to use open SSL for web server - browser communication

Blog banner

OS Assignment 1

Blog banner

Service transition principles

Blog banner

Capacity management in ITSM

Blog banner

Artical on FreshBooks

Blog banner

RAID

Blog banner

Principles of Concurrency

Blog banner

The Evolution of Operating Systems

Blog banner

virtual memory

Blog banner

File management in os

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Blog name

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Operation system

Blog banner

Mental Health

Blog banner

Wiretapping

Blog banner

Introduction to Virtual Memory - 080

Blog banner

10 Signs your Computer has Virus

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

File management In Operating System

Blog banner

Zero-Day Attack

Blog banner

Digital Forensics Challenges and Tools

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner