Young Woman with a Passion for Fashion

By Gianna Bartolini ’15 Senior Samantha Berger may seem like your average student, taking rigorous classes and playing as the captain of the soccer team, but there is more to her than meets the eye. For the last eight years, she has been working towards her goal of becoming a fashion designer. Beginning in the fourth grade, she was designing … Read More

Preoccupation with Safety Hinders Child Development

By Ashley Nnabue ’16 Across the board, recent studies have shown an intriguing relationship between children’s emotional growth and the amount of time and freedom they receive for play. In Western society today, there has been a prevailing viewpoint that a constraining parent is a good parent, but that actually may only lead to having children that are too afraid … Read More

Class Field Trips Increase Interactive Learning

By Samantha Schwartz ’16 We all know the excitement that comes with the announcement of a class field trip, from missing school to experiencing learning in a fun and interactive way. Thus far this school year, many classes have gone on a variety of field trips: 1. AP European History and Comparative Religion classes went to museums in Washington, D.C. … Read More

New AP Framework Sparks Controversy

By Steven Witkin ’16 An updated AP US History (APUSH) curriculum framework has triggered debate in several school systems. The framework, developed over four years by the College Board, was implemented for the first time this school year. Instead of focusing on content such as events, figures and the details of laws, the new framework focuses on documents and encourages … Read More

Teachers Utilize Social Media To Communicate with Students

By Samantha Schwartz ’16 Social media has begun to run teenager’s lives. They feel obligated to tell the world what they are doing, whether it’s “tweeting” their love for Chipotle or “Instagraming” a quick picture from the party the night before. Many teachers have noticed this technology obsession and opened their classrooms to it. Teachers throughout Sherwood have been logging … Read More

Promises of Privacy with New Wi-Fi

By Lauren Cosca ’15 As many students have noticed, free Wi-Fi is now available at Sherwood. The purpose of this network is to expand the availability of technology as classroom material for students and teachers. It is available to them on their iPhones, tablets and laptops. The building-wide wireless access was installed in August and September of 2013, but was … Read More

Myths Behind Society’s Social Expectations

By Meagan Barrett ’15 In society today, everyone is expected to be outgoing, talkative and perpetually social. What’s often overlooked is the fact that some people are not geared to be as expressive, animated, and, well … extroverted as these expectations would suggest. In fact, approximately one out of every three people in the United States is an introvert, and … Read More

Promises of Privacy with New Wi-Fi

By Lauren Cosca ’15 As many students have noticed, free Wi-Fi is now available at Sherwood. The purpose of this network is to expand the availability of technology as classroom material for students and teachers. It is available to them on their iPhones, tablets and laptops. The building-wide wireless access was installed in August and September of 2013, but was … Read More

Some Still Texting While Driving Despite the Dangers

By Samantha Schwartz ’16 Five seconds is the minimum amount of time a driver’s attention is taken away from the road when sending a text message while driving. When driving 55 mph, those five seconds are equivalent to driving the length of a football field without looking at the road. Distracted driving is an incredibly dangerous activity. According to the … Read More

Cyber Security Attacks Highlight Need To Protect Personal Data

By Ankur Kayastha ’15 The University of Maryland at College Park became a target of a cyber-security threat on February 19 and nearly 300,000 personal student and faculty records were compromised. The records that had been breached by a sophisticated computer virus contained names, social security numbers, dates of birth and university identification numbers. To compensate for the data breach, … Read More