wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process states

profile
Ishaan Shah
Jul 11, 2023
0 Likes
0 Discussions
29 Reads

In an operating system, a process can be in different states depending on its execution status. Here are the common process states: 1. New: The process is being created or initialized. It is not yet ready to be executed. 2. Ready: The process is prepared for execution and waiting to be assigned to a processor. It is in main memory and waiting for the CPU to be allocated. 3. Running: The process is currently being executed by the CPU. 4. Blocked (or Waiting): The process is unable to proceed and is waiting for an event to occur, such as I/O completion or a signal from another process. It is temporarily suspended and not using CPU time. 5. Terminated (or Exit): The process has completed its execution or was terminated prematurely. Its resources are released, and it is removed from the system. Processes can transition between these states based on events, scheduling algorithms, and I/O operations. The operating system manages these transitions to ensure efficient utilization of system resources and proper execution of programs.


Comments ()


Sign in

Read Next

virtual machine

Blog banner

Session Vulnerabilities

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Emailing the merger document

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Wedding photographer

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

NETSUITE

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

WORKFRONT SOFTWARE

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Pandas Matrix Applications

Blog banner

Process Description

Blog banner

Starvation

Blog banner

Mutual exclusion

Blog banner

Importance Of Education.

Blog banner

Deadlock and starvation

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Deadlock and Starvation

Blog banner

Deadlock in operating system

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Evolution of Operating Sytems

Blog banner

Deadlock and Starvation

Blog banner

Security Issues

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Data carving - using hex editor

Blog banner

Firewall in Computer Network

Blog banner

GIS Bharat Maps

Blog banner

Balance

Blog banner

TRIGGERS IN DATABASE

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

How to kiss

Blog banner

Virtual memory

Blog banner

Data Mining

Blog banner

DURGA POOJA

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Royal enfield

Blog banner

Why Friendship at Work is Important

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Busted : Common Web Security Myths

Blog banner