wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process in OS

profile
Srushti Chaurasia
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

WHAT IS A PROCESS?

When we write a program in high level language, it has to be converted into binary code with the help of compiler to make it understandable for the machine and now the program is ready for execution but it is not enough to tell the computer what it wants to do. So the operating system will help in loading that executable program into the memory and allocate its resources and then the program will begin its execution. The program till the time just sits there without doing anything but the moment it begins execution, at that instance we call that program as process.

When a program,module or function is in execution, it is called a process. When we write a computer program,it is in text file and when we execute this computer program in the main memory it becomes a process. When a program is loaded into memory and it becomes a process and it performs all the tasks mentioned in the program, it can be divided into four components stack,heap,text and data.

 The layout of process inside main memory contains‐

• Stack contains the temporary data such as functions, parameters, local variables.

• Heap provides dynamically allocated memory to process only during runtime.

• Data contains global variables and static variables

• Text includes the current activity representation by the value of program counter and the contents of processor registers

 

 

 


Comments ()


Sign in

Read Next

EVOLUTION OF MICROPROCESSOR

Blog banner

Design Considerations for Disk Cache Management

Blog banner

TRIGGERS IN DATABASE

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Buffer overflow

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

social media issue

Blog banner

Visualization in Data Science

Blog banner

I/O Buffering

Blog banner

What is Spyware? and examples of them.

Blog banner

How to Conquer Depression ?

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Virtual Machine

Blog banner

TAILS OS

Blog banner

Virtual memory in windows

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Business-to-Business

Blog banner

HUBSPOT

Blog banner

Starvation and Deadlock.

Blog banner

File and File System Structure

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Capacity management in ITSM

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

TRAIN TRAVELING

Blog banner

Direct Memory Access

Blog banner

Digital Marketing

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

LIMITED EDITION

Blog banner

Health and fitness

Blog banner

Race Conditions

Blog banner

Gamer life

Blog banner

Music is life

Blog banner

Session Hijacking

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Virus

Blog banner

What is HTML?

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Google classroom

Blog banner