Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Cyber threats for average users
or
Exploring different mediums
or
Film photography portfolio 
:
Cyber threats for average users
or
Exploring different mediums
or
Film photography portfolio 
Use the filters below to narrow your results.
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
In my capstone I will talk about the different mediums that I explored during my time at TSAS. I also included various figures that inspired me along the way. (1) ·
Well essentially its my photography portfolio. All images are black and white film dark room prints that have been scanned in; other than one color film negative scan. The portfolio had two goals for me: the capstone and submissions for OSAI Quartz Mountain. I can now proudly say both goals have bee (1)
Although capstone did take an unexpected turn, it wasn't difficult to adjust to the new changes. (1) ·
The core of it went well and I'm pleased with my portfolio. However, as an extra thing I had wanted to include a video to play alongside my portfolio at the capstone booth that would've been essentially a sped up slideshow of all my negatives. They would be in order from freshman year to my senior y (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I reflected over the numerous art mediums that I wouldn't have tried if I hadn't gone to TSAS. (1) ·
I wouldn't say I have any takeaways from the capstone itself, but I do think it served as a catalyst to hone in on my photography. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

