Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Crocheting things to make people smile
or
Cyber threats for average users
or
My project is artwork and painting, realistic and cartoon. 
:
Crocheting things to make people smile
or
Cyber threats for average users
or
My project is artwork and painting, realistic and cartoon. 
Use the filters below to narrow your results.
Determination and being honest with yourself is key—don't sign yourself up for a project that's too much to handle no matter how ideal it sounds. Choose one you won't grow tired of and can stay dedicated to through and through. (1) ·
Do what you love and know. (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I began building the structure of my future business: crocheting things to make people smile. (1) ·
My project is artwork and painting, realistic and cartoon. A lot of different colors. (1)
I have tracked my progress leading up to my store opening and my improvements in quality. (1) ·
Things did go as planned when I moved to doing art work. I was doing the Children's museum and then I changed it to art because I know more about art. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
Crocheting is a learning process—you have to have determination and dedication to improve and develop your own styles and preferences. (1) ·
I learned that it takes time and focus. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

