wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PROCESS STATES OF OPERATING SYSTEM

profile
Krish Kakadiya
Jul 12, 2023
0 Likes
0 Discussions
56 Reads

In an operating system, process states play a crucial role in managing the execution of programs and ensuring efficient utilization of system resources. Process states represent the different stages that a process goes through during its lifecycle. Understanding process states is essential for system administrators, developers, and users to comprehend the behavior and progress of running programs. Let's delve into the commonly recognized process states in an operating system.

 

1. New: When a process is created, it enters the "new" state. At this stage, the necessary resources are allocated, and initial setup tasks are performed. The process is ready to be loaded into memory and scheduled for execution.

 

2. Ready: In the "ready" state, the process is prepared to execute but awaits its turn to be assigned to a processor. It is in a queue along with other processes waiting for CPU time. The operating system's scheduler determines which process gets the CPU next based on scheduling algorithms.

 

3. Running: When a process is assigned to a CPU, it transitions into the "running" state. The CPU executes the process's instructions, and the process utilizes system resources to perform its tasks. Only one process can be in the running state on a single CPU core at any given time.

 

4. Blocked: Sometimes, a process may require external resources such as input/output operations or data from secondary storage. In such cases, the process enters a "blocked" or "waiting" state until the required resource becomes available. While waiting, the process does not consume CPU time and remains in this state until the resource becomes accessible.

 

5. Terminated: When a process completes its execution or is explicitly terminated, it enters the "terminated" state. At this stage, the process releases any acquired resources, and its information is removed from the system's process table. The process no longer exists in the system.

 

 


Comments ()


Sign in

Read Next

What is a Dumpster Diving Attack?

Blog banner

Understanding Regression Analysis

Blog banner

Types of Malware in Cyber Security

Blog banner

Man In The Middle Attack

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Cache Memory(142)

Blog banner

MYNTRA

Blog banner

Security in Operating Systems

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Uniprocessor Scheduling

Blog banner

Importance of internet

Blog banner

Modern Operating System

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

What your Favorite colour says about You?

Blog banner

Sessions In OS.

Blog banner

PODIO

Blog banner

SMARTSHEET

Blog banner

Boxing

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Linux Memory Management

Blog banner

Digital Marketing

Blog banner

Process State

Blog banner

Clustering Techniques

Blog banner

SQL Injection

Blog banner

Life of a 2020-2021 student

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Types of Threads

Blog banner

IT service level agreement

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Dudhasagar waterfall ?

Blog banner

Functions of operating system

Blog banner

DBMS and various career options related to it.

Blog banner

Sage

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Virtual memory in Operating System

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

GUIDE TO GIS

Blog banner

Virtualisation

Blog banner

Types of E-Commerce

Blog banner

My First Dream Bike

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner