Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Crocheting things to make people smile
or
Cyber threats for average users
or
Demonstrating scooter skills 
:
Crocheting things to make people smile
or
Cyber threats for average users
or
Demonstrating scooter skills 
Use the filters below to narrow your results.
Determination and being honest with yourself is key—don't sign yourself up for a project that's too much to handle no matter how ideal it sounds. Choose one you won't grow tired of and can stay dedicated to through and through. (1) ·
Don't do what I did, it did not work out lmao. (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I began building the structure of my future business: crocheting things to make people smile. (1) ·
My project was going to be a scooter edit. It was back when I was more into scootering and I know it's not good but I tried my best with the limited skills I have. (1)
I have tracked my progress leading up to my store opening and my improvements in quality. (1) ·
Realizing I have no money for it. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
Crocheting is a learning process—you have to have determination and dedication to improve and develop your own styles and preferences. (1) ·
I had to quit scooting shortly after the problem, so I wish I was able to make it better sorry. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

