wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Theads

profile
Palak Santoki
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

thread is a single sequential flow of execution of tasks of a process so it is also known as thread of execution or thread of control. There is a way of thread execution inside the process of any operating system. Apart from this, there can be more than one thread inside a process. Each thread of the same process makes use of a separate program counter and a stack of activation records and control blocks. Thread is often referred to as a lightweight process.The process can be split down into so many threads. For example, in a browser, many tabs can be viewed as threads. MS Word uses many threads - formatting text from one thread, processing input from another thread, etc.

Need of Thread:

  • It takes far less time to create a new thread in an existing process than to create a new process.
  • Threads can share the common data, they do not need to use Inter- Process communication.
  • Context switching is faster when working with threads.
  • It takes less time to terminate a thread than a process.

Advantages of User-level threads

  1. The user threads can be easily implemented than the kernel thread.
  2. User-level threads can be applied to such types of operating systems that do not support threads at the kernel-level.
  3. It is faster and efficient.

Disadvantages of User-level threads

  1. User-level threads lack coordination between the thread and the kernel.
  2. If a thread causes a page fault, the entire process is blocked.



Comments ()


Sign in

Read Next

What are NFT s?

Blog banner

Models of Information Security.

Blog banner

Hash password! Is it really secured?

Blog banner

What is Influencer Marketing and its Trends

Blog banner

A buffer overflow

Blog banner

Security issues

Blog banner

Data Visualization

Blog banner

S-Tool : Steganography

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Deadlock

Blog banner

Amazon

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Characteristics of Etherum

Blog banner

Artificial Intelligence and I

Blog banner

Memory Management - operating system

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

HUBSPOT

Blog banner

A Journey By Train

Blog banner

THREADS (assignment 1)

Blog banner

How to grow followers on Instagram business account?

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Objectives and Functions of Operating System

Blog banner

Deadlocks in Operating Systems

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Starting Android Activity Using Intent

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Types of OS

Blog banner

Functions of operating system

Blog banner

What is Internet

Blog banner

Password Generator - Lisp

Blog banner

Memory Partitioning

Blog banner

Deadlock

Blog banner