Mrs. Telnock: Computer Applications 7 CLASS NOTES

21 October

Unit A test review has been on Moodle since last week - your test should be this Thursday, barring any delays or unforeseen issues in each class. Unit A: Computer and Internet Basics Presentation (.pdf)

Also, remember that you were asked about THREE WEEKS ago to spend just ten minutes a day typing lessons and taking practice tests in your PERSONAL account. Next week will be our typing test of first quarter.

18 October

Binary Code review and dissection of desktop computers!

Today we used tools to take apart computers and identified some parts: hard drive, heat sink, fans, RAM, battery, power supply, mother board, and so much more!

17 October

What is RAM (Random Access Memory - temporary storage)?
What is ROM (Read Only Memory - permanent storage)?

Binary Code Table:

Binary Code Table

Each 0 or 1 is one bit of information = 1/8 of a byte
Eight 0s and 1s = one byte of information = one keystroke

Kilo (KB) = 1,000 so one kilobyte = approximately one thousand keystrokes
Mega (MB) = 1,000,000 so one megabyte = approximately one million keystrokes
Giga (GB) = 1,000,000,000 so one gigabyte = approximately one billion keystrokes
Tera (TB) = 1,000,000,000,000 so one terabyte = approximately one trillion keystrokes

International System of Units of Measurement

International System of Scientific Measurement

16 October

Clubs that 7th Grade Students can join, and the club advisers:

Computer Fair Club: See Middle School Computer Fair for project list - Mrs. Telnock
Earth Club - Mrs. Worozbyt, Rm. 103

Health Careers Club - Mrs. Bochicchio, Rm. 107 - first meeting after school Mon., Oct. 28
Scrapbooking Club (crafts, crochet, etc.) - Mrs. Telnock (2:30-4:30pm on scheduled Thursdays)
Service Club - Mr. Callahan, Rm. 111

15 October 

Today we discussed all vocabulary in detail. Please view at least the first five slides of the the Unit A Presentation: Computer and Internet Basics:
Unit A: Computer and Internet Basics Presentation (.pdf)

​Your Unit A Test will come from the presentation, vocabulary list and our class discussions. Unit A Review is already on Moodle - you can take it as many times as you wish!

REMEMBER: 10 minutes of typing practice each day!

11 October: Unit A: Computer and Internet Literacy

New unit time! Computer and Internet Literacy. We will start by reading, writing and storing our new vocabulary words. After writing all of the vocabulary, word for word, into your notebook, you are to log in to your PERSONAL account and work on LESSONS ONLY, no tests, no games. USE KEYBOARD COVERS. When everyone has finished writing, your teacher will call on students to read each term and definition aloud, and discuss each term as needed.

Writing requires more brain activity, activates memory, and engages you physically in putting words on paper (better for memory than just reading), so, t
oday in class, write the following vocabulary (Part I) for Unit A: Computer and Information Literacy into your notebook (24 terms), word for word, please:

The Internet - a vast interconnection of computer networks comprising millions of computing devices. Desktop computers, mainframes, smartphones, tablets, GPS units, video game consoles, and smart devices all connect to the Internet. No single organization owns or controls the Internet.

World Wide Web - "web" for short - space where digital content is served to users of the Internet. 

Browser - a free software package or mobile app that displays web pages, graphics, and online content. Popular web browsers: Chrome, Firefox, Internet Explorer, Microsoft Edge, and Safari, but there are many others that can be downloaded from the Internet.

Web Page - what you see in your browser when you are on the internet. Think of the web page as a page in a magazine. You may see text, photos, images, diagrams, links, advertisements, and more on any page you view.

URL* - Uniform Resource Locator —  web browser addresses of internet pages and files. With a URL, you can locate and bookmark specific pages and files in your web browser. 

* The format of a URL resembles this:

* URLs consist of three parts or more, but the basics:

      1. Protocol: The protocol is the portion ending in //: Most web pages use the protocol http or https, but there are other protocols. 

      2. Host: The host or top-level domain, which frequently ends in .com, .net, .edu or .org but can also end in one of many others that have been officially recognized.

     3. Filename: The filename or page name itself.
HTTP - acronym for "Hypertext Transfer Protocol," the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in your web browser.

HTTPS - acronym for "Hypertext Transfer Protocol Secure." This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others. Whenever you log in to your online bank account or a shopping site that you enter credit card information into, look for "https" in the URL for security.

HTML - Hypertext Markup Language is the programming language of web pages. HTML commands your web browser to display text and graphics in a specific fashion. 

IP Address - Your computer and EVERY DEVICE that connects to the internet uses an Internet Protocol address for identification.  Enforces accountability and traceability. In most cases, IP addresses are assigned automatically. An IP address can look something like this:

ISP - Internet Service Provider  is needed to get to the Internet. While you may access a "free" ISP at school, a library or work, or at home, someone is paying for that connection. An ISP is the company or government organization that plugs you into the vast Internet.

Router - A router or router-modem combination is the hardware device that acts as the traffic cop for network signals arriving to, and leaving from, your home or business from your ISP. A router can be wired or wireless or both.

Email - electronic mail. Sending and receiving of typewritten messages from one screen/device to another. Email is usually handled by a webmail service like Gmail or Yahoo Mail, for example.

Spam - jargon name of unwanted and unsolicited email. Spam email comes in two main categories: high-volume advertising, which is annoying, and hackers attempting to lure you into divulging your passwords, which is dangerous. 

Spam Filtering - uses software that reads your incoming email for keyword combinations and then either deletes or quarantines messages that appear to be spam.

Social Media - the broad term for any online tool that enables users to interact with thousands of other users. Facebook and Twitter are among the largest social networking sites. Protect your personal information when you sign up for sites. Most of them offer a privacy section where you can choose what to reveal to other users of the website.

E-Commerce - electronic commerce is the transactions of selling and buying online. Every day, billions of dollars exchange hands through the internet and the World Wide Web.

Encryption - the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble. 

Authentication - directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are.

Downloading - a broad term that describes transferring something you find on the internet or World Wide Web to your computer or another device. The larger the file you are copying, the longer the download takes to transfer to your computer. 

Cloud computing - began as a term to describe software that was online and borrowed, instead of purchased and installed on your computer. Web-based email is one example of cloud computing. The user's email is all stored and accessed in the cloud of the internet, not on personal devices.

Firewall - a generic term to describe a barrier against destruction. In the case of computing, a firewall consists of software or hardware that protects your computer from hackers and viruses.

Malware - the broad term to describe any malicious software designed by hackers. The time bombs and wicked minions of dishonest programmers. Malware includes viruses, trojans, keyloggers, zombie programs, and any other software that seeks to do one of four things:

1. Vandalize your computer in some way
2. Steal your private information
3. Take remote control of your computer (zombie your computer) 
4. Manipulate you into purchasing something

Trojan - a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software programs. 

Phishing - the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords or PINs. 

When you finish writing the terms and complete definitions in your notebook, go to personal account and work on LESSONS ONLY. 

Unit A: Computer and Internet Basics Presentation (.pdf)

9 October: Presentations continue today!

8 October: Presentations TODAY!

In your notebooks, give feedback for each presenter in three areas: voice volume, interesting content, eye contact.

Remember your first day of school welcome letter? A deadline is a deadline. No excuses, forward motion, and, if your work is not complete, you are presenting anyway: 

"One important key to success is self-confidence.
An important key to self-confidence is preparation."  ~Arthur Ashe

7 October: Presentations begin tomorrow - must be finished IN CLASS today!

PRACTICE YOUR SPEAKER NOTES MANY TIMES so that you will be able to make EYE CONTACT with your audience during your presentation.

Today is the day to finalize your speaker notes. You received the form on Friday and we finished the title slide together then.

Lucky 7 Steps 2-4 happen on the Slide 1 title slide speaker notes. 

Title Slide, Slide 1:
1. Know your audience
2. Greet the audience.
3. Introduce yourself and give your credentials.
4. Introduce the topic and give audience expectations.

Slides 2-6 are Step 5:
Deliver the Content.

Slide 7 is Step 6:
Review the content and give audience expectations AGAIN.

Step 7 is done while Slide 7 is still on the screen. Do not leave Slide 7.

"One important key to success is self-confidence.
An important key to self-confidence is preparation."  ~Arthur Ashe

so that you will be able to make EYE CONTACT with your audience during your presentation.

4 October: Images on Slides

We only had a single digit number of people that did not complete their assignment last night. Great job to those that did your work and are up to speed. Your pictures are fantastic and I am really looking forward to experiencing your presentations! Speaker notes sheets were distributed today and we will complete them on Monday. Presentations begin Tuesday! Enjoy your weekend!

3 October: SIX PHOTOS needed for your partner's presentation about YOU

Upload relevant, appropriate photos of yourself, family, etc. to your Google Drive account. Log in to your SCHOOL DRIVE ACCOUNT (,  Click New>File Upload and select the photos you want to upload. Once uploaded, right click and SHARE with your presentation partner. You must be able to access the photos in class tomorrow! Remember the categories: Family, School, Interests and Hobbies, Social Life, Future Goals and All About (You). They do NOT need to be current photos as you are talking about your whole life! We discussed on Monday that presentations are all about the photos, so get them uploaded to Google Drive because they must be accessible in class. They can also be emailed to me from your parents or yourself to WITH YOUR FULL NAME IN THE SUBJECT LINE.

Blended families: it is fine to have more than photo for the family slide!

1 October: Introduction to Microsoft PowerPoint - How to Build a Presentation

Start > Programs > Microsoft PowerPoint. Industry in general (where you will be working one day) does not use Google Drive - Microsoft Office Suite is the norm so we must be fluent using Word, PowerPoint and Excel. You will learn Access in the high school if you take Information Technology class.

Before you even type in the presentation (or any software), SAVE (Ctrl+S)
and choose WHERE to save first, then name the file. At school will go to Desktop>Your Name>Create a New Folder and name it CA (for Computer Applications).

Name your file, "neighbor."

Type, "Getting to Know (hit Enter) My Neighbor" in the title area.

Click in the subtitle area, click Align Left button above, and type, "An Interview with (neighbor's name here)" and hit Enter. Type, Presented by your first and last names.

Click and hold on middle top resizing handle of the text box and drag down just until the last line is totally visible.

Ctrl+S  Save early and often!

Ctlr+M creates a New Slide. In the title area, type, "First Name's Family" and continue making and titling slides as Family, School, Interests and Hobbies, Social Life, Future Goals and All About( Name of Interviewee).

Using bullets icon, create bulleted lists, not full sentences, of the information (FIVE OR MORE pieces of information) on each slide.

30 September: Getting to Know My Neighbor

Today you will be interviewing your neighbor on five subject areas: Family, School, Interests and Hobbies, Social Life, and Future Goals. All information will be written in your notebooks. Your goal is to obtain AT LEAST five pieces of information in each of the categories, (and type hem in bullet form on your slides tomorrow).

Be sensitive to your neighbor, especially in the Family category, if they do not want to discuss a member. Let it go and move on. Absent people: you will be interviewing each other.

​ school account and personal account information was given out today except in P2. ALL CLASSES: spend at least 10 minutes every day typing lessons and taking practice tests in your PERSONAL account! Timed Typing Test will occur toward the end of first quarter (which ends on Halloween)!

27 September: Internet Safety Test today!

Free eBooks

Good Reads - Make an account! It is not that, "smart people read," rather, people GET smart by reading!

26 September: INTERNET SAFETY TEST TOMORROW! (notes from Sept. 13 and up)

Bad choices have consequences:

Eeyore's House

It occurred to Pooh and Piglet that they hadn't heard from Eeyore for several days, so they put on their hats and coats and trotted across the Hundred Acre Wood to Eeyore's stick house. Inside the house was Eeyore.

"Hello Eeyore," said Pooh.
"Hello Pooh. Hello Piglet," said Eeyore, in a Glum Sounding Voice.
"We just thought we'd check in on you," said Piglet, "because we hadn't heard from you, and so we wanted to know if you were okay."

Eeyore was silent for a moment. "Am I okay?" he asked, eventually. "Well, I don't know, to be honest. Are any of us really okay? That's what I ask myself. All I can tell you, Pooh and Piglet, is that right now I feel really rather Sad, and Alone, and Not Much Fun To Be Around At All. Which is why I haven't bothered you. Because you wouldn't want to waste your time hanging out with someone who is Sad, and Alone, and Not Much Fun To Be Around At All, would you now."

Pooh looked at Piglet, and Piglet looked at Pooh, and they both sat down, one on either side of Eeyore in his stick house.

Eeyore looked at them in surprise. "What are you doing?"

"We're sitting here with you," said Pooh, "because we are your friends. And true friends don't care if someone is feeling Sad, or Alone, or Not Much Fun To Be Around At All. True friends are there for you anyway. And so here we are."

"Oh," said Eeyore. "Oh." And the three of them sat there in silence, and while Pooh and Piglet said nothing at all; somehow, almost imperceptibly, Eeyore started to feel a very tiny little bit better.

Because Pooh and Piglet were There. 

No more; no less.

(A.A. Milne, E.H. Shepard)

Think about it: 

If about half (50%) of all teens have been or are victims of cyber bullying, that means the other 50% are either bullies or bystanders.

While predators are grooming children online, their first goal is develop trust.

Child molesters, bullies and all other abusers have what personality trait in common? Apathy - 
lack of concern, passivity, lack of interest, indifference. They do not care if/when they hurt others.


Bullying, cyber bullying and suicide: over 4,000 teens commit suicide every year. It is the second leading cause of death for youth. Let's PREVENT this by learning the signs and knowing when to get HELP for yourself or someone else.

Know the 
Five Warning Signs for Depression in Teens: 


  • Feelings of sadness or hopelessness, often accompanied by anxiety.
  • Declining school performance.
  • Loss of pleasure/interest in social and sports activities.
  • Sleeping too little or too much.
  • Changes in weight or appetite. 

Three Steps Teens Can Take:

  • Take your friend's actions, and words, seriously.
  • Encourage your friend to seek professional help, accompany if necessary.
  • Talk to an adult that you trust will take action right away. Don't be alone in helping your friend. 

For more information to empower yourself:


To log in to Study Island:  you must click on Study Island for Schools (yellow login button on right) NOT Study Island for Home.  Username is first.last.dsd and the password is your lunch PIN.

Complete watching any videos  (scroll to Middle and High School) listed below on Sept. 20 and 23 that were not finished in any particular class yesterday. 

Review your notes - vocabulary, video summaries, Top 10 Online Manners, everything Internet Safety!

7th Grade Interest Survey

23 September

One of the photos we viewed on today was of a common loon, which most people have never seen or heard. Click here to hear the call of a common loon.

Today in class we watched, discussed, and wrote summaries in notebooks for these movies (scroll to Middle and High School):

Julie's Journey
Survivor Diaries
Tracking Teresa (use this link)
Amy's Choice (use this link)
Sextorion (extortion with inappropriate images)

Review your notes
- vocabulary, video summaries, Top 10 Online Manners, everything Internet Safety!

20 September

NetSmartz is National Center for Missing and Exploited Children's (NCMEC) online safety education program. It provides age-appropriate videos and activities to help teach children be safer online with the goal of helping children to become more aware of potential online risks and empowering them to help prevent victimization by making safer choices on- and offline. Using NetSmartz fulfills the PA requirements for teaching Internet Safety.

Internet Safety: and scroll down to videos. If you were not in class Friday, WATCH the following titles on that page and WRITE A SUMMARY in your notebook:

6 Degrees of Information (use this link - the rest are on - just scroll to Middle and High School):

Your Photo Fate
Two Kinds of Stupid
Broken Friendship
You Can't Take it Back

19 September

Internet Safety: Megan's Law Registrants - Keeping Yourself Safe.

Share these sites with your parents.

Family Watch Dog: Offenders in Your Neighborhoods

PA Megan's Law

PSP Site: Offenders in Dunmore

18 September

Amber Alert: History

Guidelines for Issuing Amber Alerts

Megan's Law: History and Federal Facts

17 September

This is why your parents CONSTANTLY want to know EXACTLY where you are. They know all of the bad things that happen when bad choices are made and they are worried about you. Be where you are supposed to be. If you are hiding something from your parents, it is NOT in your best interest and you should NOT be doing it. So stop.

NCMEC Home page (scroll, too, and read)

National Center for Missing and Exploited Children (as seen on LivePD) Help ID Me page

13 - 16 September

To the few that failed the Lucky 7 test today, you are reminded that the Lucky 7 Practice Test on Moodle, the one that you took in class yesterday, and the one you could take an unlimited number of times (both here and at home), was EXACTLY the same as today's test. Also, you have had the Lucky 7 (in class and online, scroll down) since August 29 (that's 15 days). Summer vacation is over and you need to focus on your job, school. You will need to know the Lucky 7 throughout the year so go take the practice test often until you KNOW the steps of presenting.

Internet Safety Vocabulary for this unit:

Blog – A Web log, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture. Blogs can be set up on social networking sites or on separate blogging websites, such as Xanga® and Blogger®. 

Bookmark – A way to quickly access a favorite website by saving it in your browser.

Browser – A program that allows users to view Web pages. Mozilla® Foxfire and Microsoft® Internet Explorer are examples of popular browsers.

Chat Acronym – An acronym used to communicate, usually through instant (ex.: ASL = age, sex, location)

Chat Room – An interactive forum where you can talk in real-time. The chat room is the place or location online where the chat is taking place. Many chat rooms are established so that people can discuss a common interest like music or movies. Criminals use chat rooms to meet future victims.

Cyberbullying – Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones. For more information about cyberbullying and its different forms, visit

CyberTipline® – The Congressionally-mandated CyberTipline is operated by the National Center for Missing & Exploited Children. It is a means for reporting crimes against children, such as child sexual exploitation. It can be reached at

E-mail (electronic mail) – A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address.

Geolocation Services – Users may use these services to share their locations with their friends or with other users. Examples of these services include •Facebook
® •Foursquare® 

Grooming –This is the process predators use to manipulate minors into sexual relationships or into producing sexual images of themselves. It often includes the giving of compliments or gifts. For more information about predators and their tactics, visit

Hacker – A popular term for someone who accesses computer information either legally or illegally.

Instant Messaging – Through instant messaging (IM), users can quickly exchange messages with other online users, simulating a real-time conversation or “chat.” Messages appear almost instantly on the recipient’s monitor, and anyone designated as a “buddy” can participate.

Netiquette – Courtesy, honesty, and polite behavior practiced on the Internet.

Profile – Social media sites often call for users to create a profile where they share certain information, such as their real names, hobbies, and interests. Facebook® and MySpace® users create a profile when they join the sites.

Sexting – The use of cell phones to send sexual messages, pictures, and videos. 

Smartphone - Unlike its more basic counterparts, smartphones have operating systems and allow users to run applications similar to those used on computers. For example, users may be able to view, create, and edit documents from a smartphone.

Social Media Sites – Internet applications which are used to facilitate communication between users. These applications include Facebook, Instagram, Snapchat, etc.

The above and below terms can be used interchangeably.

Social Networking Site – An online community where people from all over the world may meet and share common interests. These sites allow members to set up a profile, which may include information such as name, location, phone number, age, and gender. Often users will post pictures and videos.

Trusted Adult - a parent or another adult that you know is concerned about your best interest. This is the person or persons you go to when you have a problem or worry. You also want to share your good news with this person or people.

Webcam – Webcams, also known as “cams,” are video cameras set up on home computers or laptops that can be accessed via the World Wide Web.

Top 10 Online Manners - Learn the Rules! These apply to the Offline World, too!

1. Make sure the words you use online are words that you would use face-to-face.
2. Avoid using the Internet to convey upset feelings. Do it in person instead.
3. Type all messages in lowercase letters. Typing in CAPITALS is considered yelling online. (stop using multiple punctuation marks - can be viewed as obnoxious)
4. Respect your own privacy and the privacy of others.
5. Never harass, abuse, or threaten others online.
6. If you disagree with someone, respond to the subject, not the person.
7. Always avoid using racist or discriminatory terms.
8. Don't spread rumors, gossip, or other harmful words about another person.
9. Use good grammar when writing to authority figures.
10. Obey the law.

12 September

Today was the Multiple Intelligences test. If you were absent today, you will see a ZERO on the portal until you make up your test. After the test, we practiced the order of the Lucky 7 (TEST TOMORROW), the seven steps for presenting, which you have known since the second day of school. The practice test is on Moodle (for most, lastname2025 for username and PIN for password at If you have a special username, you were told what it was). You may take the practice test as many times as you wish. It is located under Upcoming Events in the right column of your Moodle home page.

11 September

Discussion of the Terrorist Attacks of September 11, 2001: 9/11 Memorial

9 September

Today in class, using our Eight Intelligences Scoring Chart, we completed a group activity using this sheet:  biggest_smart_smallest_smart.pdf

STUDY FOR YOUR TEST ON THURSDAY - All needed information is below:​

Multiple Intelligences and Example Activities

Verbal Linguistic: story telling, journaling, pre-reading word
and letter recognition

Musical Rhythmic: singing, humming, chanting, playing with 
instruments, role-play to enact stories and patterns

Logical Mathematical: puzzles, manipulative, pattern games, 
number sequences

Visual Spatial: painting, drawing, multimedia, visual rich activities

Bodily Kinesthetic: dance, aerobic exercise, drama, role playing, sculpturing

Naturalist: outdoor nature collecting, mapping, comparison of natural elements

Intrapersonal: self-paced independent work and exploration, reflection

Interpersonal: cooperative/partner activities, sharing, explaining, demonstrating

6 September

Completed viewing presentation on Multiple Intelligences in class today, for all classes. Periods 2 and 3 learned about Ocearch Tracker today so now we have all had the experience learning about this amazing collaborative group working hard for abundance of species in Earth's oceans. 

5 September

Math portion of 4Sight benchmark assessment was today during 2nd and 3rd period.

Periods 7, 8 and 9 (periods 2 and 3 will do this Monday, 9/9)
Multiple Intelligences: Find your strengths! There are EIGHT different kinds of smart, not just math smart or reading smart, so let's dive it!

Once you have your scores, complete this sheet: biggest_smart_smallest_smart.pdf

No one uses just one type of intelligence; we all use several in our daily lives. Some are stronger than others for each person. Thus it's helpful to determine your top intelligences and see where you need to increase your exposure and study of others.

8 Multiple Intelligences Graphic


4 September

4Sight Reading assessment occurred during all of second and third period today. The math portion will occur tomorrow during second and third period. Go to your 2nd period class as usual.

Afternoon classes used Ocearch Tracker, the amazing turtle, whale, seal, shark, alligator, and dolphin research organization! Second and third periods will have a little time using it in class tomorrow. All students need to be aware of what this group is and what they do for the sea life of Earth!

3 September

In class today, we set up Google Chrome so that the sites on our Web site login sheet plus, will open each time we open Chrome. Open all pages, one in each tab, then click the 'eggs in a column' - the three dots in the upper right. Choose Settings. Scroll to the bottom where it says, "On startup," and click the box that says open specific pages, and then use current pages.

We then utilized and discussed all that you will see in the world, using this, not, for your searches. Something new every day!

29 August: Presentation Skills 

Remember the Lucky 7:

1. Know your audience.
2. Greet your audience.
3. Introduce yourself (full name) and give credentials.
4. Introduce topic and give [audience] expectation(s).
5. Deliver the content.
6. Review the content and the [audience] expectation(s).
7. Thank audience.

Placing a drawing paper in portrait orientation (vertical), draw YOU in your ideal learning environment, learning about the subject that you are most passionate!

On lined paper, write an MLA heading and centered title, "Ideal Learning Environment," and get started on your speech, based on the Lucky 7.

28 August:

Discussion of Lock-Down Drills: Silent, Still, Out of Sight (no cell phones, watches, etc.)

ILE: Ideal Learning Environment

In your notebook, make a random order list of the things that you are passionate about learning. They do NOT need to fit into the categories of school subjects. Now decide which subject you are MOST passionate about learning.


Know the warning signs.


Five Warning Signs for Depression in Teens: 


Feelings of sadness or hopelessness, 

often accompanied by anxiety.


Declining school performance.


Loss of pleasure/interest in social and sports activities.


Sleeping too little or too much.


Changes in weight or appetite. 

Know the warning signs.


Five Warning Signs for Depression in Teens: 


Feelings of sadness or hopelessness, 

often accompanied by anxiety.


Declining school performance.


Loss of pleasure/interest in social and sports activities.


Sleeping too little or too much.


Changes in weight or appetite. 

Website by SchoolMessenger Presence. © 2019 West Corporation. All rights reserved.