Thursday, January 30, 2020

Chessington World of adventures Essay Example for Free

Chessington World of adventures Essay In this assignment I am going to investigate the purpose for which an organisation uses ICT. The company that I am going to review is called Chessington World of Adventures. I will also write about the ICT systems used in one department that I have written about in unit 2a. I will write about the marketing department and explain devices they use etc. In the marketing department they use many different types of computers for many different things. Some staff will use their computers for typing long documents or letters; others may use them for creating PowerPoint presentations for various things. In most organisations people will use their computers or a choice of devices for similar things, but this isnt the case in Chessington. Proposed Hardware and Software for a Computer Aided Design Company There are several pieces of computer equipment a design company would need to function efficiently. Firstly they would need the correct input and output devices. To input the data a computer and mouse would be needed, these are standard input devices. The company would perhaps benefit from the use of a light pen rather than a mouse, though this would depend greatly on the software packages they would be using. Another input device that may be useful to the company would be a Graphics Tablet or Digitiser. The user can draw professional quality illustrations onto the flat rectangular surface of the digitiser, using a stylus. The computer traces the movement of the stylus and displays it on the screen. A high-resolution tablet would be needed by a CAD company. A scanner may also be of use to the company, or a digital camera, depending on what exactly the company was designing. Images of high quality can be obtained from the use of a digital camera, and there are many high-resolution scanners that would allow the company to scan in pictures that will be needed in the design of the product they are creating. Whether the company chose a scanner with OCR (optical Character Recognition) would be there choice, though it would not be necessary. The software the company would need would probably be specialist software, rather than off-the-shelf packages. However as well as this the company would need the relevant software to co-ordinate the input and output devices (this normally comes with the hardware). An operating system, such as Microsoft Windows, would be essential, and it may also be useful to the company to have a word processing and a database package. This would allow the company to keep their accounts on computer and allow them to send mail merge letters, for example. Output devices the company would need are obviously a printer. I would expect them to choose a colour laser printer, as this provides the best quality printouts, quickly and quietly. The expense of the toner cartridges would be easily justified, as the plans/posters the company will be creating are essential to their business. If the company need to produce detailed line drawings a plotter would be ideal. The company would also need a visual display unit. As they will undoubtedly want to work with many colours and a high resolution the type of VDU I would recommend is an XGA (extended graphics array), which has a resolution of 1024 x 768 pixels. The company may even want a screen with an even higher resolution. As for the memory required by the company, they will need a very powerful processor, perhaps a 1GB processor. They will also need enough RAM to run all the applications. As well as the company will need non-volatile memory, ROM. This could be anything from magnetic tapes to optical disks. I think it would be advisable for the company to have a large hard disk drive, to save templates on, for example. Floppy Disks would not really be a suitable solution as they arent big enough to hold large picture files, for examples. CD-Rs or CD-RWs would be more suitable to save individual design projects on, and magnetic tape, such as Digital Linear Tape, would be a suitable method of backing storage due its large memory capabilities. Graphics: Graphics are computer-generated images, such as pictures or illustrations. The range of graphics software is extensive and you have probably come across images stored in word processing software (e. g. Clipart) and images created on the computer using lines and shapes (e. g. circles, rectangle, or square). STAGES OF DEVELOPMENT: Before you can design or write a computer program, there are many stages of development that you must go through when doing this process, these are as follow; Analysis of the requirement what does the computer program need to achieve? Design of solution. Development of the program probably broken down the into small subprograms. Implementation and testing of the program, including training of the eventual users of the program. Preparation of documentation, which will include documentation relating to the actual program and documentation for the users (i. e. a users guide or manual). Ongoing maintenance and development of the program. In this department I will mention these components groups: Input Output   Processor   Storage   Ports/Cables Input An input device is any hardware, which is used to enter data into the computer system. Chessingtons keyboards are the most common input devices, which are used. They use a QWERTY keyboard, which is the most common type of keyboard. The name comes from the first six letters on the keyboard. They are based on the design of the first typewriters. Each key is connected to a switch, which closes when the key is pressed. This sends a signal to the CPU based on the characters ASCII code. There is another type of keyboard that is called a Concept keyboard (soft touch keyboard). They are faster but more limited. They are normally used in the food shops and the restaurants around Chessington. Each switch has a symbol on it representing a piece of data stored in the computer like the price. This is designed to meet the needs of the marketing department. The second most popular piece of hardware used in the marketing department is the mouse. There are two or three buttons. When a cursor is over an icon, menu item or edge of a picture the mouse button can be clicked once or double clicked to give the computer a command. It Can also be held down to drag something over the screen. There is a ball under the mouse that moves across a flat surface. Sensors measure the movements of the balls in two directions and from this the computer can measure the distance travelled. This is used to move the cursor on the screen. There are other types of mouses like a: Tracker ball, which works in the same way as a mouse, but the ball is moved by hand so it takes up less space. This is a fiddly method that is not that accurate or quick. The marketing department use this because it is easier to use and more common than the other types of mouses. Touch sensitive pad, which look like small screens. You move your finger across the pad, which moves the cursor. They use less space than a mouse but they are easily damaged and not very reliable. The employees in Chessington dont think its suitable to use. Little pimples work by putting your finger on them and pushing them in the direction you want the cursor to move. They are very small and not very precise/accurate. Output An output device is any hardware used to communicate the result of data processing carried out by the CPU (Central Processing Unit). The most common output device used in the marketing department is a VDU (Visual Display Unit) also more commonly known as a monitor. They are used when visual information is needed. The two ways in which monitors differ are size and resolution. Size is measured in inches across the diagonal of the screen. Most PCs have 17inches and laptops have 12 inches. Resolution changes by the number of pixels/dots, which make up the viewed image on the screen. The two main types of monitors are: LCDs (Liquid Crystal Display), which are used in laptops and some desktops. This is the monitor, which the department uses most of the time when the employees are working in groups or individually. CRTs (Cathode Ray Tubes), which are used in PCs. These are the same ones as used in TVs and can be damaging to the eyes when in long use. The marketing department rarely use this because of the consequences and the after effect. Another main output device is a printer. This is used to produce a permanent hard copy of the information on paper. There are three types of printers used in the marketing department: Dot-Matrix Printers also called impact printers, which are the cheapest to buy and operate. The cashiers of shops around Chessington mainly use this in tills. The print head is a template of pins consisting of 9 or 24 arranged in a vertical line or block. Each fibre is formed using a set pattern of some of the pins. The ribbon is a long strip of material with ink on one side. The print head pins push the ribbon on the paper to create a series of dots. The advantages are that it is cheap to buy and operate. The disadvantages are that it is very slow, low resolution and very noisy. An Ink-Jet Printer costs less than a laser printer but better quality than a Dot Matrix. This is the most common type used by many organisations. The main component is the print head. This has lots of tiny nozzles or spouts through which small jets of ink are sprayed on to the paper. The advantages are good resolution-300 to 600, which means you can print good quality documents, and often in colour. Disadvantages are its can be slow when printing in colour, often less than four pages per minute. It can be expensive to run and the cartridges cost more per page than laser printer cartridges. Thirdly the Laser Printer that is also called the page printers because the data to be printed is sent to the printer in complete pages, one at a time. This printer is the type of printer output device that Chessintgon mainly uses. They work in the same way as photocopiers. There are four main parts, which are the electrostatic rotating drum that has a negative electrical charge. The laser reflects on to the drum a mirror image of the page to be printed. Where the page hits the drum the negative charge is removed. When the drum passes over the toner cartridge the ink is attracted to the negatively charged areas of the drum. The ink is then transferred on to the printer paper. The fuser unit heats the paper to fuse the ink onto it. The advantages of a laser printer are very high resolution like 600 dots per inch or more meaning they can print high quality documents. They are also very fast by managing to print over 10 pages per minute and also very quiet. The disadvantages though are they are still quite expensive. There are lots of complex parts inside which are expensive to repair. The marketing department cant use continuous or multi-part stationary. How the CPU controls input and output hardware This shows how the information from the input (hardware) devices transmits information into the Central Processing Unit (CPU). The Central Processing Unit then processes the given information, organises it and then transmits it to the output devices that display it. Processor Storage The main storage of the computer stores all of the data, which is going to be processed. All of the data is entered from an input device. The data will reside in memory while it is being processed, then it will be joined by the results of the processing, which will be contained until it is to be carried out and transferred to an output device. ROM (read only memory) holds predefined program instructions that were written onto the ROM permanently during the manufacturing. These instructions are non-volatile, which means the instructions are unaffected by loss of power, from the computer. RAM (random access memory) is possible to read or write to this type of memory but the contents will be deleted when the power is turned off and the data will not been saved. RAM is also used to hold programs such as Microsoft word while they are running they are held as files on a disk when they are not in use. RAM also holds graphics data, which is shown on the screen, on the VDU. Ports/Cables CABLES AND CONNECTORS: CABLES: The different components of a computer system are connected by the cables. CONNECTORS: Computers have connection signs to show the person where to put the wire in, e. g.if you were to look behind a tower case you can see the mouse sign to where you put in. The Control Unit The control unit (CU) coordinates the work of the whole computer system. It controls the hardware attached to the system by making sure that the command given to the program are activated. It controls the input and output of data, so all the signals go to the right place at the right time and also controls the flow of the data with the CPU. The Arithmetic and Logical Unit This is where the computer processes data by either manipulating it or acting upon it. The Arithmetic part does calculations. The Logic part makes decisions. Immediate Access Store The (IAS) holds any data and programs needed by the computer when they are being used. The CPU reads data and programs kept on the backing storage that is stored temporarily in the IASs memory. The Advantages and Disadvantages of using IT There are different times when to use ICT and when not to. For example when you want to write the same letter to more than one person, it would be ideal to use ICT to do a mail merge on Microsoft Word. If you want to keep permanent records UN damaged then ICT will be the best way. When not to use ICT will be when you just want to make notes, quick drafts or diagrams. When you are not creating anything permanently, just deciding different ideas. The Advantages A computer based filing database system takes up a lot less space than a paper based filing system. Searching for records is a lot easier and quicker. More than one person at a time can access the data if it is a network connection PC. The data is saved/stays in the computers memory and it wont get lost or miss filed. There a fewer staff needed to look after the computer system. Reports can be generated very quickly often by an automated processing routine. The Disadvantages Setting up a computer system is very expensive. Big systems in large organisations such as the NHS cost millions of pounds. Computer systems need to people to maintain and use them. Training costs can be high and the money is wasted if that person leaves. Computer systems are not perfect, if there is a system failure or a power cut, then the important data may get lost or corrupted. It can be easy to copy files and so remove confidential information from the system. The system needs to be kept secure from unauthorised users and hackers. Data Validation and Verification Data Validation Data validation checks the data is the correct type. The computer can perform validation automatically while the data is being entered. There are four main data validation techniques: Range check This makes sure that the data is within the specified range for example a percentage is 0% 100%. Presence check This makes sure that important information has been entered for example when a person orders an item online they need to enter their name, address and credit card number or without these it wont allow it to function. Check digit This checks that numerical data has been entered accurately Data type check This will check to make sure that text has been entered where needed and not numbers for example. Data Verification This is different compared to validation because this is making sure the data that has been input is the same as the original data. There are two main verification techniques: Proof-reading is when a person reads the data that has been entered onto the system and compares with the original, any incorrectly entered data will be edited. Double entry is when the data is entered by twice by two people. The computer then compares the two versions and any found errors are then corrected. Problems with data validation are that it only checks that it is the right type and not whether it is accurate or not. Any problems with the verification program could mean other possible mistakes. Problems with data verification are that double entry is time consuming and can be very expensive. Proof reading is also expensive and doesnt allow for computer error. Analysis In my project, I found the hardest thing was trying to create a booking system. That one page took me four weeks, as I had to type the HTML code, edit it and re edit it. Publisher was much easier to adapt to. There is nothing that I would change to my project as I feel I have done mine the best possible way. One of my problems was trying to insert a calendar on the site. When I did it I couldnt proportion it correctly. The text wasnt as visible as I would have liked unless I proportioned it to the whole page. In the end I chose to abandon the calendar. None of the layouts suited my task so I had re design/alter the way they had done it. I did a different background and colour scheme. When using HTML it was hard remembering to use the American language to write it in instead of English. I did like the way that Publisher toolbar menus were easy to use and understand, for example inserting hyperlinks was much easier than in HTML due to the excellent Microsoft Wizard. I chose Publisher as it actually had a web site creating program unlike Microsoft Word. I thought that this project was good and the way I did it. Next time I do my project I would write out long texts areas in Microsoft Word because it is easier to do alignment, format and spell check the text. I would still use Microsoft Publisher if it was accessible otherwise HTML. I would also try to be more creative next time for example like adding Java features.

Wednesday, January 22, 2020

E-Books :: essays research papers

Business Systems and Technology The thought of books being on computers shows mankind’s need to use technology. Just imagine all the paper used in books around the world. Think of all the trees e-books would save. E-books are definitely the way of the future, but it won’t be a simple or rapid change. In a perfect world 20 years from now, students will no longer carry around bulky backpacks. Libraries will be in smaller, extremely technologically advanced buildings. Magazine shops may very well cease to exist. But what had to be done before all this could occur?   Ã‚  Ã‚  Ã‚  Ã‚  Chances are, just about every person in the world would have some sort of e-book reader. These don’t come cheap at all. Prices could vary from $200 to $600. Computer programs that could read e-books have a certain level of system requirements. These requirements are fairly high now, let alone 20 years from now. Before e-books can become widely popular, people would have to make the choice between migrating to portable computers and purchasing a stand-alone e-book reader.   Ã‚  Ã‚  Ã‚  Ã‚  What do you think the storage capacity on these e-book readers would be? Judging by today’s technology, the capacity would be quite enormous. But will that be enough for everyone? People will want to have every book they own at their fingertips so that at a moments notice they can reference Shakespeare or the latest articles in Times Magazine. People will want to be linked to their storage mediums at home all the time. This is where powerful wireless networks come into play. Network designers will have to come up with ways to make it possible for e-books to become internet ready, which would give people the ability to access their entire home library.

Monday, January 13, 2020

Case Scenario: Bug, Inc. Essay

The following is a case scenario provided by the University of Phoenix titled Bug, Inc., prepared by Susan Brown Cooper. Scenario: BUG, Inc., a company based in Any State, U.S.A., designs, manufactures, and sells electronic recording devices. These devices are used by law enforcement agencies (police, FBI, etc.) to intercept and record sounds and voices. The equipment taps into telephone wires, cell phone transmissions, and picks up sounds and voices through the walls of a house or in open-air locations through the use of a remote microphone. Part of the equipment is driven by software written by BUG employees. BUG has exclusive contracts with most state and federal law enforcement agencies throughout the United States. BUG is thinking about expanding its sales to international markets. Currently, half of its manufacturing plants are in foreign countries and half are in the U.S. The company’s logo is a ladybug wearing a set of headphones. As a team, we will be answering a series of questions based on this scenario and our reading of the text, Business Law, the Ethical, Global, and E-Commerce Environment. (Mallor, Barnes, Bowers, & Langvardt, 2002) Case Scenario: Bug, Inc. 1. Define the different type(s) of legal protections BUG should have for its intellectual property. Explain why these protections are necessary. Patent – Protects Bug, Inc from having other parties copy the design of their electronic devices for 20 years from the date they file a patent application with the United States Patent and Trademark Office. Copyright – Protects the object codes and source codes of the computer programs created by Bug, Inc., and their employees, that are used in conjunction with their surveillance equipment. Trademark – Protects Bug, Inc’s ladybug logo from being copied by competitors. Trademarks, like patents, must be registered with the United States Patent and Trademark Office. Registration lasts for 10 years rather than 20, but can be renewed for additional 10-year periods. 2. Earlier this year, WIRETAP, Inc., a relatively new company trying to compete with BUG, sent an employee to BUG to get a job. BUG, not realizing Steve was an employee of WIRETAP, hired him to work in its research and development department located in Any State, U.S.A. While working at BUG, Steve forwarded any BUG e-mail he received to WIRETAP. This included e-mail between BUG officers (both domestic and abroad) that Steve intercepted using his hacking ability. At the end of each week, Steve met with his boss at WIRETAP and gave him all the information he obtained about the BUG product lines. Discuss in detail what type(s), if any, of civil liability Steve and/or WIRETAP may face if caught. Steve and WIRETAP may face several types of civil liability to include patent infringement, misappropriation of a trade secret, and interference with prospective advantage. WIRETAP would be liable for patent infringement if they used any information or sold any product that contained elements of a patented invention, which they might have received information on from Steve. They would also be liable if a recently designed or changed product had similar elements to any product that BUG had patented, even if the product was different in design. Since Steve assisted WIRETAP in obtaining information, he could also be liable for contributory infringement, if the information he obtained was used to infringe on the patentee’s rights. Depending on the information received and used by WIRETAP, they might or might not be liable for patent infringement. Though they might not be held liable for patent infringement, they have are at risk of being liable for misappropriation of a trade secret. A trade secret is defined as, â€Å"any secret formula, pattern, process, program, device, method, technique, or compilation of information used in the owner’s business, if it gives its owner an advantage over competitors who do not know it or use it†( ). If the information that WIRETAP received was considered a secret and of potential value, WIRETAP will most likely be held responsible for misappropriation liability. A misappropriation liability occurs when a secret is acquired by  improper means or an individual breached a duty of confidentiality regarding the secret. In Steve’s case, both were committed. First, WIRETAP committed fraud by sending one of their employees to be hired by BUS in order to gain inside access to the company. Secondly, Steve intercepted certain emails by using his hacking ability and broke his confidentiality agreement by giving WIRETAP information that was probably confidential. The last civil liability WIRETAP might face is interference with prospective advantage. Since WIRETAP intentionally interfered by stealing certain information, BUS could argue that they lost an advantage in their industry because of information that was placed into the wrong hands. In order for WIRETAP to be liable, BUS would have to prove that they had an advantage and that the advantage was lost by the illegal actions of one of their competitors. 3.& Walter, a security guard for BUG, learns that Steve really works for WIRETAP. Walter takes Steve to a small soundproof room where he keeps him for six hours. During this time, Walter continues to ask Steve what he is doing at BUG and what information he has given WIRETAP. Walter tells Steve that he will hurt him if he does not tell him everything. Steve finally tells Walter what he wants to know. Walter then lets Steve go home. Has Walter committed any torts? If so, explain. Discuss any liability BUG may have for Walter’s actions. Walter’s actions led to him committing three different torts to include assault, intentional infliction of emotional distress, and false imprisonment. False imprisonment was first committed when Walters kept Steve in a room for six hours in attempt to gain the truth from him. From the scenario described above, one would assume that Steve did not agree to stay confined in a room for an hour but instead, was confined in a room without his consent. Assault occurred when the security guard decided to threaten to hurt Steve unless he told him everything he knew. Though the guard never acted on his threats, Steve feared for his safety, therefore telling Walter everything he wanted to know. By placing Steve in a confined area for several hours and threatening to hurt him, Walters’s outrageous conduct  would have placed emotionally distress on Steve. Since Walters is an employee for BUG, BUG would be liable to pay for any damages that occurred because of the emotional distress that was placed on Steve. The only reason BUG might not be held responsible for the security guard’s actions is if they can prove the he did not act on behalf of the company, therefore making him Walters liable to pay for all damages. 4. BUG has come to you for advice regarding interstate and international e-commerce. BUG wants to sell its products through the Internet. BUG is concerned about privacy, security, infringement issues, email contract validity, and various other things. BUG is also concerned because a company that buys famous and/or company name domain names seems to own the rights to BUG.com. The company is willing to sell the domain name for a high price. Advise BUG on all e-commerce issues that could possibly affect them. Be detailed in your response. It is in the company’s best interest to sell its products online. Although there are many precautions one must take, it is still critical in being competitive in today’s marketplace. BUG must be aware of the various issues engaged in the e-commerce environment. Fraud is a high rise for one and both the company and customers are skeptical regarding making online purchases. BUG should be sure to provide security and privacy, speed in processing transactions, and fulfilling orders. BUG should have a spam free, popup free ecommerce storefront; secure all transactions with the latest SSL security standards; display disclaimer during the checkout process; and keep constant watch on the changes in Internet security provided periodically test. The company should also find an e-commerce solution that allows real time processing and try using proven shipping carriers that reach all locations within the designated time-frame. In addition, BUG may want to try to create its own domain, which will allow more security as well as distance from competitors. By using the same domain as one that had been used, will have only allow more unnecessary visitors at that site which will only add greater risk for fraud activities and security to be tampered with. BUG is to follow all legal laws in all countries affiliated, state economic barriers, and government provisions are to be acknowledged. 5. Shady Town, U.S.A. has been plagued with a recent crime wave. The BUG plant in Shady Town has experienced vandalized vehicles in its parking lot and some second shift employees have been robbed as they walked to their cars at night. BUG receives shipments of parts and other items from vendors at its receiving/shipping dock located at the rear of each plant. The parking lot and dock areas are well lit; however, some lights are now out. While waiting for the dock manager to return from lunch, a vendor was attacked and robbed of his wallet and electronic chips he was delivering. Discuss what, if any, tort liability BUG may have to the vendor and to the BUG employees that were attacked. What defenses may be available to BUG? Explain your answers. 6. The attorneys for BUG have completed their investigation of WIRETAP and its employee, Steve. If they want to bring a successful action against WIRETAP for civil RICO, what do they need to prove? What type(s) of damages could BUG receive? In order to bring a successful suit against WIRETAP, BUG would first have to prove that Steve was acting on the behalf of WIRETAP. Another huge factor, which would play a significant role on the damages BUG could receive, would be the information that Steve gave WIRETAP, and how that information was actually used. If BUG wanted to receive damages for patent infringement, they would need to prove that WIRETAP acquired and used information that was owned by BUG and protected by a patent. The basic damages that could be recovered patent infringement are damages equivalent to the infringement and compensation for court costs and interest. Damages equivalent to the infringement would include at least the determined amount of money the infringer profited for the use made of the invention but damages could include up to three times of those actually suffered. To receive damages for the misappropriation of a trade secret, BUG would have to prove that WIRETAP possessed a trade secret, and it was acquired by improper means, or Steve breached a duty of confidentiality regarding the secret. The damages that BUG could be entitled to include damages related to  the actual loss caused by the misappropriation and any profit received by the defendant from the misappropriation. Depending on the state, BUG could also be awarded punitive damages if the misappropriation is considered malicious. In addition to the damages described above, BUG might be entitled to damages for the interference with a prospective advantage. To receive such damages, they would have to prove that future advantages were lost because of the interference of WIRETAP and the improper use of information received by the company. The damages would then be based on the any future advantage that might have been lost. 7. Sally DoGood, a police officer in Shady Town, was sitting in a police van monitoring wiretaps placed in the Crime Boss hideout. The equipment she was using, which was an older model purchased from BUG, short-circuited and injured Sally. An insulator that could have prevented the possibility of shorts was not included in the original design because of its effect on production costs. The newer models, not yet purchased by the Shady Town Police, have the insulator installed. Sally may have a successful case against BUG for what tort(s)? Explain your answer(s). Sally may have a successful case against BUG for negligence and for causation of personal injury. Negligence can be used because there was intent on the part of BUG to not put in the part that could have prevented the short-circuit and the injury. If the original design had included this part and not been left out due to production costs, it could have saved BUG money in the lawsuit and saved Sally the pain that was caused to her. There also seems to be negligence on the part of the police department. They know the newer models are better and safer, yet they have not purchased them yet. Causation of personal injury exists because she was injured because of the fact that the company, BUG, did not include the piece necessary for the equipment to work properly. Had the insulator been in all of the designs, this injury could have been avoided. It was intentionally left out, and therefore caused personal injury. References: Business Law: The Ethical, Global, and E-commerce Environment (12th ed.). Jane P. Mallor, A. James Barnes, L. Thomas Bowers, & Arlen W. Langvardt McGraw Hill, 2004 Burr Ridge, IL University of Phoenix Material: Case Scenario: Bug, Inc., Susan Brown Parker. Retrieved from http://www.phoenix.edu Prospective

Sunday, January 5, 2020

Teen Pregnancy And The United States - 2027 Words

The issue being addressed is teen pregnancy rates in the United States. We can measure this problem by giving statistics on teen pregnancy related information and by describing the magnitude of the problem. Teen pregnancy exists everywhere in the world but the main focus of this policy memo is going to be that of the United States. Define and Analyze the Problem affected individuals. Teen mothers, their babies, the father, parents of the teen mother and father, and everyone in the United States to be exact are affected every year by teen pregnancies. Age, race, ethnicity and sex all come into play when talking about who is being affected by teen pregnancy. Ages fifteen to nineteen are the rage for teen girls being affected by teen pregnancy and both male and females are affected by the outcome of teen pregnancy. According to The PEW Charitable Trusts in 2013, Latina teens have the highest birth rate at 42 births per 1,000 teens and non-Hispanic white teens were 19 births per 1,000 teens (PEW, 2015). According to the U.S Department of Health and Human Services (HHS), â€Å"teen girls who get pregnant are less likely to finish high school, more likely to rely on public assistance, more likely to be poor as adults, and are more likely to have kids who have poorer educational, behavioral, and health outcomes o ver the course of their lives than do kids born to older parents† (HHS, 2016). Teen pregnancy affects everyone in the United States, for example costing taxpayersShow MoreRelatedTeen Pregnancy And The United States1414 Words   |  6 PagesTeen Parenting in the United States Raising a child as an adult can be very demanding at times, but can you imagine how difficult it would be to raise a baby as a teen, when you are still a child yourself? Although the teen birth rate in the United States has been on a decline for the past decade, teen pregnancy is still a significant issue affecting many people (Teen Pregnancy and Childbearing). Teen pregnancy has been considered morally and ethically wrong in the United States for centuries (Sprague)Read MoreTeen Pregnancy in the United States1201 Words   |  5 PagesTeen pregnancy is more prevalent in the United States, than one would think. Even though the number of pregnancies has lowered, there are still an estimated 31pregnancies per 1000 teens. Unfortunately, there are immense consequences from teen pregnancy. These occurrences are due to many circumstances that can be changed, such as, more education, peer pressure, and today’s culture. However, there are ways to prevent all this from happening; usin g contraception, being aware, or even abstaining fromRead MoreTeen Pregnancy : The United States1939 Words   |  8 PagesTEEN PREGNANCY Section One: â€Å"Why?† The United States has the highest rates of teen pregnancy and births in the western industrialized world. Teen pregnancy costs the United States at least $7 billion annually. Family First Aid has stated that â€Å"thirty-four percent of young women become pregnant at least once before they reach the age of 20 — about 820,000 a year. Eight in ten of these teen pregnancies are unintended and 79 percent are to unmarried teens.† You may ask why so many teens are pregnantRead MoreTeen Pregnancy And Its Effects On The United States1667 Words   |  7 PagesEach year around 90,000 adolescents become pregnant in the United States. Around 51% of adolescents pregnancies end in live births, 35% end up in induced abortions, and 14% result in miscarriage or stillbirth (Frick, 2007). Historically, the highest teen pregnancy rates in the United States were during the 1950’s and 1960’s before the legalization of abortion and the development of many the current forms of contraception(Frick, 2007). Rates enlarged steadily until 1991; since then, the birth rateRead MoreTeen Pregnancy Costs The United States1577 Words   |  7 Pages Section One: â€Å"Why?† The United States has the highest rates of teen pregnancy and births in the western industrialized world. Teen pregnancy costs the United States at least $7 billion annually. Family First Aid has stated that â€Å"thirty-four percent of young women become pregnant at least once before they reach the age of 20 — about 820,000 a year. Eight in ten of these teen pregnancies are unintended and 79 percent are to unmarried teens.† You may ask why so many teens are pregnant. It may be becauseRead MoreThe Effects Of Teen Pregnancy On The United States2305 Words   |  10 PagesTeen Pregnancy and the Link to Poverty in the U.S. with A Focus on Western Ma Especially Holyoke and Springfield Mass In the 1950s, the frequency of teenage births in the United States was already high, and since that, time has decreased, although the number of births outside marriage has increased. Thus, in 1990 the rate was 61.8 births, pregnancy rate - 116.9 per 1,000. The incidence of teenage pregnancy has decreased significantly in the 1990s. This decline is observed in all racial groups, butRead MoreTeen Pregnancy in the United States Essays3049 Words   |  13 PagesTeen Pregnancy in the United States Introduction Teen pregnancy falls into the category of pregnancies in girls age 19 or younger (NIH). Although statistics have shown a decrease, the number of teen pregnancy in the U.S. is still relatively high compared to the rest of the world. Sexual health is one of the top priorities in early adolescence health in the United States. Consequences of having sex at a young age generally results in unsafe sex practices. The consequences can be due to the lackRead More Teen Pregnancy in the United States Essay2801 Words   |  12 Pagessociety†. (Pregnant Teen Help, Teen Pregnancy Statistics) Some would argue that teen pregnancy is all glorified. Other individuals would protest that it is too influential. Teen pregnancy is a rising social problem in the United States and among other countries. Teen pregnancy is now being publicized as multi media corporations, with shows such as â€Å"16 Pregnant†, â€Å"Teen Mom†, â€Å"Maury†, â€Å"Secret Life of the American Teen ager†, and â€Å"Juno†. All of which concentrate on teen pregnancy. These shows or moviesRead MoreTeen Pregnancy Effects On The United States1922 Words   |  8 PagesIntroduction Adolescent pregnancy is a widely researched and debated topic in psychology. Teen pregnancy rates in the United States have dropped significantly over the last two decades from 6.2% in 1990 to 2.7% in 2013, a 56% decrease, for women aged 15-19. Despite the sharp decline, concerns about the consequences of adolescent childbearing have not decreased. While evidence suggests that giving birth as a teenager is often associated with economic hardships, numerous researchers argue that theseRead MoreTeen Pregnancy is a Growing Problem in the United States1084 Words   |  4 Pageslocated in a tourist town on the northern Oregon coast, where according to the United States Census Bureau the median income as of 2012 was $24,201 (table 1).I remember in high school there was always a girl I knew who was pregnant, but it was not until recently when I noticed so many of my classmates and friends announcing due dates. According to Medline Plus, adolescent or teen pregnancy can be defined as â€Å"pregnancy in girls age 19 or younger† (para. 1). According to the CDC’s â€Å"Births: Final Data