Drilldown: CapGrads
CapGrads > Capshortdescrip
:
Cyber threats for average users
or
Finding my photography style
or
Portfolio website 
:
Cyber threats for average users
or
Finding my photography style
or
Portfolio website 
Use the filters below to narrow your results.
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
It's a website filled with my darkroom and digital photography. Visit my website [https://joylynnsmetana.wixsite.com/joylynnsphotography here]. (1) ·
My project is over what I've learned through the years I’ve been engaged with photography. Also, how I got into doing photography and what made me find my style in photography. (1)
A sort of TED talk like presentation. (1) ·
I started with what got me into photography and how it changed my point of view with art, and how to create stories behind the art from one’s view. (1) ·
It started as a self love project, but over time I realized that it wouldn't be possible to finish in quarantine. So, I decided to make a photography website (1)
I completely started over and changed my entire project. (1) ·
My plan did change because I wasn’t planning on making a video, I was planning on making a clear display with my photos hanging and lights around them with what I wrote in the center of my display. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I was overworking myself and took on too big of a workload. (1) ·
I’ve learned that one idea takes you to another, and becomes bigger than you were even planning on making it. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

