wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process states

profile
Ishaan Shah
Jul 11, 2023
0 Likes
0 Discussions
29 Reads

In an operating system, a process can be in different states depending on its execution status. Here are the common process states: 1. New: The process is being created or initialized. It is not yet ready to be executed. 2. Ready: The process is prepared for execution and waiting to be assigned to a processor. It is in main memory and waiting for the CPU to be allocated. 3. Running: The process is currently being executed by the CPU. 4. Blocked (or Waiting): The process is unable to proceed and is waiting for an event to occur, such as I/O completion or a signal from another process. It is temporarily suspended and not using CPU time. 5. Terminated (or Exit): The process has completed its execution or was terminated prematurely. Its resources are released, and it is removed from the system. Processes can transition between these states based on events, scheduling algorithms, and I/O operations. The operating system manages these transitions to ensure efficient utilization of system resources and proper execution of programs.


Comments ()


Sign in

Read Next

CYBER SECURITY CHALLENGES

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

BITCOIN WALLET

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

virtual memory

Blog banner

memory management

Blog banner

Artificial Intelligence (AI)

Blog banner

Virtual Memory

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Operating system

Blog banner

INSTAGRAM

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

MAILFENCE

Blog banner

Pink sauce pasta

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

How to use GIT & GITHUB

Blog banner

Memory management

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Types of Malware in Cyber Security

Blog banner

Windows Operating System

Blog banner

Buffering

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Concurrency and Deadlocks

Blog banner

OPERATING SYSTEM

Blog banner

Modern operating system

Blog banner

Service Transition Process in ITSM

Blog banner

Health is Wealth

Blog banner

Mail merge

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Data Mapping

Blog banner

Google

Blog banner

Oracle Corporation

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Stop Racism

Blog banner

Password Generator - Lisp

Blog banner