Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Crocheting things to make people smile
or
Cyber threats for average users
or
Volunteering at the Tulsa SPCA 
:
Crocheting things to make people smile
or
Cyber threats for average users
or
Volunteering at the Tulsa SPCA 
Use the filters below to narrow your results.
Determination and being honest with yourself is key—don't sign yourself up for a project that's too much to handle no matter how ideal it sounds. Choose one you won't grow tired of and can stay dedicated to through and through. (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1) ·
Pick something you love. You will be spending a lot of time at this location and it is more enjoyable if you love it. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I began building the structure of my future business: crocheting things to make people smile. (1) ·
I did a PowerPoint presentation about the History of the Tulsa SPCA, the Service they provide, and the volunteering I did for them. (1)
I added information about the services they provide. (1) ·
I have tracked my progress leading up to my store opening and my improvements in quality. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
Crocheting is a learning process—you have to have determination and dedication to improve and develop your own styles and preferences. (1) ·
I love working with animals and will look into careers with animals. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

