Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Cyber threats for average users
or
Documenting my TulsaTech experience
or
Drawings of animals 
:
Cyber threats for average users
or
Documenting my TulsaTech experience
or
Drawings of animals 
Use the filters below to narrow your results.
Go to Tulsa Tech, that’s it. You always have a head start, or even it you don’t want to do it you will have a skill or trade to fall back on. (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1) ·
When you get an idea, make sure it's you—that it has a meaning to you—and make sure the people that see it know that is what you want to do in the future. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I will be showing you different drawings of water and land animals. (1) ·
This is a project of just my everyday life at Tulsa Tech. It also shows the difference between it and a traditional high school. Also how it affected my future and also how it helped me get jobs, internship, etc. (1)
None (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1) ·
Yeah, they went as planned. I had originally planned to do it with my other friends who went to Tulsa Tech, so you could see the comparison between the experiences. (1)
It just helped me realize how much TulsaTech has done for me. (1) ·
That art work has been going on for a while and art can change your view of it (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

