wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process states

profile
Ishaan Shah
Jul 11, 2023
0 Likes
0 Discussions
29 Reads

In an operating system, a process can be in different states depending on its execution status. Here are the common process states: 1. New: The process is being created or initialized. It is not yet ready to be executed. 2. Ready: The process is prepared for execution and waiting to be assigned to a processor. It is in main memory and waiting for the CPU to be allocated. 3. Running: The process is currently being executed by the CPU. 4. Blocked (or Waiting): The process is unable to proceed and is waiting for an event to occur, such as I/O completion or a signal from another process. It is temporarily suspended and not using CPU time. 5. Terminated (or Exit): The process has completed its execution or was terminated prematurely. Its resources are released, and it is removed from the system. Processes can transition between these states based on events, scheduling algorithms, and I/O operations. The operating system manages these transitions to ensure efficient utilization of system resources and proper execution of programs.


Comments ()


Sign in

Read Next

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Buffer overflow

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

SNAPCHAT

Blog banner

Fault Tolerance

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Crypto tax evasion

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Capacity management in ITSM

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Platonic Solids

Blog banner

Starting Android Activity Using Intent

Blog banner

Honeypot in cyber security

Blog banner

Electronic Funds Transfer

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Raid

Blog banner

Operating System

Blog banner

Deadlock

Blog banner

gis substation

Blog banner

File system

Blog banner

Music

Blog banner

AI and Cyber Security

Blog banner

Virtual memory

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Fitness

Blog banner

USES OF WHATSAPP

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Deadlock

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Clustering Techniques

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

How to write a cover letter

Blog banner

Deadlock

Blog banner

File system implementation

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Deadlock

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Never give up

Blog banner