Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Start
This is the initial state when a process is first started/created.
2. Ready
The process is waiting to be assigned to a processor. Ready processes are waiting to have the processor allocated to them by the operating system so that they can run. Process may come into this state after Start state or while running it by but interrupted by the scheduler to assign CPU to some other process.
3. Running
Once the process has been assigned to a processor by the OS scheduler, the process state is set to running and the processor executes its instructions.
4. Waiting
Process moves into the waiting state if it needs to wait for a resource, such as waiting for user input, or waiting for a file to become available.
5. Terminated or Exit
Once the process finishes its execution, or it is terminated by the operating system, it is moved to the terminated state where it waits to be removed from main memory
chegedict answered the question on March 30, 2020 at 07:21
- Convert the following binary number 1101.012 to decimal.(Solved)
Convert the following binary number 1101.012 to decimal.
Date posted: November 18, 2019. Answers (1)
- Perform the following binary arithmetic.
i) 111112 + 111112
ii) 110102 - 10102(Solved)
Perform the following binary arithmetic.
i) 111112 + 111112
ii) 110102 - 10102
Date posted: November 18, 2019. Answers (1)
- Convert the following hexadecimal number to its decimal equivalence 11116(Solved)
Convert the following hexadecimal number to its decimal equivalence 11116
Date posted: November 18, 2019. Answers (1)
- List the advantages of using an electronic database system for storage of data over the file approach.(Solved)
List the advantages of using an electronic database system for storage of data over the file approach.
Date posted: November 18, 2019. Answers (1)
- Define the following terms.
(i) Database management system.
(ii) Network database.(Solved)
Define the following terms.
(i) Database management system.
(ii) Network database.
Date posted: November 18, 2019. Answers (1)
- Describe the following database features
(i) Macros
(ii) Programming module(Solved)
Describe the following database features
(i) Macros
(ii) Programming module
Date posted: November 18, 2019. Answers (1)
- List three types of data integrity constraints that should be observed in a database(Solved)
List three types of data integrity constraints that should be observed in a database
Date posted: November 18, 2019. Answers (1)
- The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.(Solved)
The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.
i. Name and describe the purpose of the devices labeled A
ii. State two functions of the device labeled server
iii. Name any three transmission medias that can be used to transmit internet to the server .
iv. Explain any two challenges that can be faced by interior network user.
v. Name the network topology used above
Date posted: November 14, 2019. Answers (1)
- List two programs that can be used by Web Developers.(Solved)
List two programs that can be used by Web Developers.
Date posted: November 14, 2019. Answers (1)
- Differentiate between peer to peer and server based network.(Solved)
Differentiate between peer to peer and server based network.
Date posted: November 14, 2019. Answers (1)
- A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the...(Solved)
A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the network administrator.
Date posted: November 14, 2019. Answers (1)
- Explain the following terms as used in desktop publishing.(Solved)
Explain the following terms as used in desktop publishing.
a. Embedded object.
b. Autoflow.
Date posted: November 14, 2019. Answers (1)
- The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell...(Solved)
The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.
Date posted: November 14, 2019. Answers (1)
- Give any two characteristics of master file.(Solved)
Give any two characteristics of master file.
Date posted: November 8, 2019. Answers (1)
- Perform the following binary arithmetic.(Solved)
Perform the following binary arithmetic.
Date posted: November 8, 2019. Answers (1)
- Give any two benefit of hacking to an organization’s computer system.(Solved)
Give any two benefit of hacking to an organization’s computer system.
Date posted: November 8, 2019. Answers (1)
- Mention any three ways of ensuring efficient back up of data.(Solved)
Mention any three ways of ensuring efficient back up of data.
Date posted: November 8, 2019. Answers (1)
- List three paragraph formatting features of word processors.(Solved)
List three paragraph formatting features of word processors.
Date posted: November 8, 2019. Answers (1)
- Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function(Solved)
Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function
Date posted: November 8, 2019. Answers (1)
- State two operational methods of an organizational ensuring the security of data.(Solved)
State two operational methods of an organizational ensuring the security of data.
Date posted: November 8, 2019. Answers (1)