Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Cyber threats for average users
or
Drawings of animals
or
Painted wooden canvases of teachers. 
:
Cyber threats for average users
or
Drawings of animals
or
Painted wooden canvases of teachers. 
Use the filters below to narrow your results.
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1) ·
Stay true to you. What you love doing can be your Capstone and just trust the process. (1) ·
When you get an idea, make sure it's you—that it has a meaning to you—and make sure the people that see it know that is what you want to do in the future. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I will be showing you different drawings of water and land animals. (1) ·
Wooden canvases I painted with the teachers I've had throughout all the 4 years that I've been to TSAS. (1)
None (1) ·
I decided to change the way I sketched the paintings. I had talks with Karner and Foshee about how I could make this project better. They asked why I was tracing instead of drawing it myself. I took a couple of days to process that as well. Why was I doing that? It always felt like I was a fake ever (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I learned to stay true to my style and trust the process. Also how I need to realize that I'm not going to be a professional painter/artist overnight. Also stop giving myself such a hard time. (1) ·
That art work has been going on for a while and art can change your view of it (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

