Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Cyber threats for average users
or
Drawings of animals
or
Healing sickness or injury in canines 
:
Cyber threats for average users
or
Drawings of animals
or
Healing sickness or injury in canines 
Use the filters below to narrow your results.
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1) ·
Take as many notes as possible and stay organized. (1) ·
When you get an idea, make sure it's you—that it has a meaning to you—and make sure the people that see it know that is what you want to do in the future. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I will be showing you different drawings of water and land animals. (1) ·
My project is about canine health and how I helped my dogs with common sicknesses or injuries that they could have gotten from walks or going to the dog park. (1)
None (1) ·
The project name was going to be Animal Health including other animals as well but I couldn't include them unfortunately due to having to move. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I learned that not all dog breeds are the same with sicknesses or even injuries, I also learned how to sanitize properly and safely for animals. The takeaways were having to realize that not all you try to save might make it, but at least you tried and gave them hope at the end. (1) ·
That art work has been going on for a while and art can change your view of it (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

