wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PROCESS STATE:

profile
Apeksha Tank
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

Process states refer to the different operational states that a process can be in within an operating system.

These states typically include:

1. Running: The process is currently being executed by the processor.

2. Ready: The process is prepared to be executed and is waiting to be assigned to the processor.

3. Blocked: The process is unable to proceed because it is waiting for a particular event, such as input/output (I/O) completion or a resource allocation. It is temporarily halted until the event occurs.

4. Suspended: The process is temporarily removed from the main memory and placed in secondary storage, often due to limited resources or prioritization. It can be later swapped back into main memory for execution.

5. Terminated: The process has finished its execution and has been removed from the system.Its resources are released, and any associated data is cleaned up.

 These process states help the operating system efficiently manage and schedule tasks, allocate resources, and handle events within a computer system.

 The transition between these states is usually controlled by the operating system, based on events, priorities, and scheduling algorithms.


Comments ()


Sign in

Read Next

History of Money

Blog banner

Security issues

Blog banner

Deadlock and Starvation

Blog banner

Deadlock and Starvation

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Multicore CPUs

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Mumbai Metro 3

Blog banner

IT Service Continuity Management

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

What is a Malware ?

Blog banner

Cache memory

Blog banner

Direct memory access

Blog banner

Having passion in life

Blog banner

Virtual memory

Blog banner

Multiprocessor scheduling

Blog banner

Wiretapping

Blog banner

Os(Computer security threats)

Blog banner

RAID and It's Levels

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

A book review

Blog banner

Not anti-social, but pro-solitude

Blog banner

An Overview of Virtual Machines

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Risk mitigation and management

Blog banner

Lucidchart

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Photography

Blog banner

Cyber Forensics on IOT Devices

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

INTERNET

Blog banner

Memory Management

Blog banner

My First Dream Bike

Blog banner

The most common internet security threats

Blog banner

Process, process creation and process termination

Blog banner

Evolution of Operating system

Blog banner

Threading

Blog banner

WomenEmpowerment

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Network Forensics Tools and Techniques

Blog banner

Uniprocessor Scheduling

Blog banner