• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

This report is about the need to upgrade the new computer systems for our company.

Extracts from this document...




There is a need to acquire a new computer system to bring substantial benefits to the company in the modern business arena.

Report To: Members of the Board of directors


This report is about the need to upgrade the new computer systems for our company.  It also discusses the advantages and the disadvantages of both the old system which is currently used by our company and the new system available at present.  The aim is to bring substantial benefits to the company by using a new computer system which supports multiprogramming and virtual memory.  This is because quality of our products and services are very poor when compare to other companies which are using new computer systems such as Multiprogramming and Virtual Memory.  There are several disadvantages and constraints appear in our current system.  And also the current system is now nearly out of date and may fail to work properly.  The maintenance cost is increasing and the quality of service which the system provides are decreasing.  For these reasons it is time to analyze the current system and to introduce the new system very soon.  

The current system (Single User Batch System)

The current system is using old technology called the batch system.  It is used by several years all over the industrial countries and was very famous.  Its growth brought many changes in the industrial world and human’s working style.

...read more.


  • The sales catalogue of products and services used to price customer orders is often out of date.  In particular, new items and services are not catalogued immediately and items which are now no longer stocked still appear.  The problem is located in the time-consuming nature of the batch system used to prepare the catalogue from the inventory records.
  • Customer requirements are sometimes difficult to deal with as records of orders are unable to access immediately on time.
  • Orders that cannot be immediately satisfied from current stock and production that is, back orders are not processed consistently.
  • Due to the large number of documents flowing through the system the time taken to process an order may be days, even if all the goods are held in the warehouse.
  • For some kind of huge jobs it takes time in hourly rate or days.  Consequently large number of employers could not able to finish their job within one day as a result they can not carried out other jobs and  unable to meet their deadlines.
  • Data within the system is generally stored in a way which makes it difficult for management to retrieve useful information.  For instance, regular reports are time-consuming to produce and are often late, rendering them ineffective for control purposes or to aid medium-term strategies.
  • As a result company’s all the processes are carried out in very slow rate and unable to provide quality service for our customers.
...read more.



It is very clear now the multiprogramming and the virtual memory techniques are provides high quality for the computer system and they provides substantial benefits for low cost.  And also the multiprogramming and the virtual memory technologies are very popular and used by several companies.   Furthermore they have many advantages and could not find any disadvantages when compare to our old batch system. Batch system is now uncommon and if we continued with the current system our company may face massive lost in our market.  The new system with multiprogramming and the virtual memory will increase the quality of our service and productivity.  These developments sought not only to increase the number of tasks completed per unit of time but also to increase the efficiency of hardware usage on single tasks.  Furthermore by using new system our market can be extended across the world and can maintain the steadiness. I believe that it will be a forwarded and reasonable movement of our company’s history and necessary to do now.  


H.M DIETEL, Operating Systems, second edition

IDA. M. FLYNN, ANN McLVER McHOES, Understanding Operating Systems, second edition

ANDREW S. TANENBAUM, Structured Computer Organization, fourth edition




...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    is interfaced to various on-board peripherals through integrated device interfaces and 8-bit wide EMIF bus. The DM6437 EVM comprises of input and output video ports that can support a variety of user application. These interfaces are discussed in the following two sections below [7].

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    how developers use this information to progress from one stage another with regards to actually carrying out the analysis, design stages etc. This is evident as SSADM futures five modules but no explanation with regards to how developers interact between these.

  1. Linux memory management. Linux uses demand paging where the virtual pages are only loaded ...

    This scheme requires every page in the system having an age which changes as the page is accessed. The more frequently that a page is accessed, the younger it is; the less that it is accessed the older it becomes.

  2. Methods and technology used in Computer Forensics

    SECTION A: RESEARCH, THEORY & METHODOLOGIES The primary focus of this document will be an examination of technical aspects involved in the application of computer forensic techniques, as well as a practical demonstration of a selection of these.

  1. Lifecycle Management Of Information Technology Project In Construction

    will produce better ?olution?. Technical ?olution?: ICT tool? to ?upport unified approach to project management A practical minimum requirement for applying unified approach to project management i? ?ome type of ICT platform that allow? view? to be repre?ented, inter-related, acce??ed, and utilized in an efficient manner by all project participant?.

  2. Network report for Middlesex University. The current network design is a star topology with ...

    Virtual LAN A VLAN is also an extended Layer 2 switched domain. VLAN has the same characteristics of a failure domain, broadcast domain, and spanning-tree domain, as described before. So, although VLANs can be used to segment the campus network logically, deploying pervasive VLANs throughout the campus adds to the complexity.

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    * design and create a model robot vehicle * teach the robot to navigate in the artificial world * use the patch class in Steve to replace the sensors used in [1]. 1.2 Background The problem of dynamic collision free path planning is vital to mobile robots and robots used in homeland applications.

  2. This report will discuss the benefits and constraints of network systems and topologies.

    Each of those services are essentially offered once the appropriate software has been installed and configured on the server. Therefore, servers can be classified in HTTP servers, DNS-servers and etc. I discuss now two different server types: a database server and a DNS-server.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work