Drilldown: CapGrads
CapGrads > Capstonebegin
:
A sort of TED talk like presentation.
or
I had always planned to involve my art in my capstone.
or
Photography was the starting project and is the continued project. 
:
A sort of TED talk like presentation.
or
I had always planned to involve my art in my capstone.
or
Photography was the starting project and is the continued project. 
Use the filters below to narrow your results.
I want to tell all the rising seniors to strive for what you want in life and don't give up because God has a plan for everyone have faith. (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1) ·
Start it early. (1)
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I will be showcasing my photos. Visit [https://zachariahphotography.com/ Zachariah Photography]. (1) ·
In my capstone I will talk about the different mediums that I explored during my time at TSAS. I also included various figures that inspired me along the way. (1)
Although capstone did take an unexpected turn, it wasn't difficult to adjust to the new changes. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1) ·
Yes Things went as planned and no nothing was adjusted. (1)
I learned that you shouldn't be afraid to put yourself out there. My takeaway is that this project is very important to me. (1) ·
I reflected over the numerous art mediums that I wouldn't have tried if I hadn't gone to TSAS. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

