Drilldown: CapGrads
CapGrads > Capstonebegin
:
A portfolio of my photography work.
or
A sort of TED talk like presentation.
or
I planned a beekeeping project but never started. 
:
A portfolio of my photography work.
or
A sort of TED talk like presentation.
or
I planned a beekeeping project but never started. 
Use the filters below to narrow your results.
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
My project is fluid painting or paint pouring. I find this very therapeutic and relaxing. (1) ·
Well essentially its my photography portfolio. All images are black and white film dark room prints that have been scanned in; other than one color film negative scan. The portfolio had two goals for me: the capstone and submissions for OSAI Quartz Mountain. I can now proudly say both goals have bee (1)
I completely changed mine because I was behind already, school ended, and this is what I could come up with. (1) ·
The core of it went well and I'm pleased with my portfolio. However, as an extra thing I had wanted to include a video to play alongside my portfolio at the capstone booth that would've been essentially a sped up slideshow of all my negatives. They would be in order from freshman year to my senior y (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I had a good time painting and making the project. (1) ·
I wouldn't say I have any takeaways from the capstone itself, but I do think it served as a catalyst to hone in on my photography. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

