wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Theads

profile
Palak Santoki
Aug 15, 2024
0 Likes
0 Discussions
40 Reads

thread is a single sequential flow of execution of tasks of a process so it is also known as thread of execution or thread of control. There is a way of thread execution inside the process of any operating system. Apart from this, there can be more than one thread inside a process. Each thread of the same process makes use of a separate program counter and a stack of activation records and control blocks. Thread is often referred to as a lightweight process.


Comments ()


Sign in

Read Next

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Why Data Security Is Important

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Know your Processors!

Blog banner

Tracking Emails & Email Crimes

Blog banner

Development Of Modern Operating System

Blog banner

Process, process creation and process termination

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

virtual machine

Blog banner

Stop Racism

Blog banner

memory management

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Types of threads

Blog banner

Malware Defense

Blog banner

Install Ubuntu in Vmware

Blog banner

What is OS and its overview

Blog banner

Disk Management

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Operating system

Blog banner

Starvation

Blog banner

Theads

Blog banner

Types of Threads

Blog banner

GIS Mapping

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Direct memory access

Blog banner

Evolution of operating system

Blog banner

History of Money

Blog banner

Fault Tolerance

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

CRISP-DM Methodology

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

K-means use cases

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Time Series Analysis

Blog banner

Europe Through My Lens

Blog banner

Security in Cloud Computing

Blog banner

WomenEmpowerment

Blog banner

Data Structures

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Types of Threads

Blog banner