wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

PROCESS STATES OF OPERATING SYSTEM

profile
Krish Kakadiya
Jul 12, 2023
0 Likes
0 Discussions
56 Reads

In an operating system, process states play a crucial role in managing the execution of programs and ensuring efficient utilization of system resources. Process states represent the different stages that a process goes through during its lifecycle. Understanding process states is essential for system administrators, developers, and users to comprehend the behavior and progress of running programs. Let's delve into the commonly recognized process states in an operating system.

 

1. New: When a process is created, it enters the "new" state. At this stage, the necessary resources are allocated, and initial setup tasks are performed. The process is ready to be loaded into memory and scheduled for execution.

 

2. Ready: In the "ready" state, the process is prepared to execute but awaits its turn to be assigned to a processor. It is in a queue along with other processes waiting for CPU time. The operating system's scheduler determines which process gets the CPU next based on scheduling algorithms.

 

3. Running: When a process is assigned to a CPU, it transitions into the "running" state. The CPU executes the process's instructions, and the process utilizes system resources to perform its tasks. Only one process can be in the running state on a single CPU core at any given time.

 

4. Blocked: Sometimes, a process may require external resources such as input/output operations or data from secondary storage. In such cases, the process enters a "blocked" or "waiting" state until the required resource becomes available. While waiting, the process does not consume CPU time and remains in this state until the resource becomes accessible.

 

5. Terminated: When a process completes its execution or is explicitly terminated, it enters the "terminated" state. At this stage, the process releases any acquired resources, and its information is removed from the system's process table. The process no longer exists in the system.

 

 


Comments ()


Sign in

Read Next

INTRODUCTION

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Memory Management of Operating System(OS)

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Vulnerability Assessment

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

RAID

Blog banner

Understanding Regression Analysis

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Blog name

Blog banner

Gamer life

Blog banner

OLA

Blog banner

VIRTUAL MACHINES

Blog banner

undefined

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Memory Management

Blog banner

GIS in Disaster Management

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

E-Governance

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Memory Management in Operating System

Blog banner

Direct Memory Access

Blog banner

Operating System

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Modern Operating Systems

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Self defence

Blog banner

Mendeley (management software)

Blog banner

The most common internet security threats

Blog banner

Deadlock and Starvation

Blog banner

Trello ( management software)

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Social Engineering Attacks

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Satellite Based Positioning

Blog banner

Apple

Blog banner

Internet of Things and cyber security

Blog banner