Drilldown: CapGrads
CapGrads > Capstonebegin
:
A sort of TED talk like presentation.
or
I described it the same: how social media effects a person and how it changes your mind.
or
I had always planned to involve my art in my capstone. 
:
A sort of TED talk like presentation.
or
I described it the same: how social media effects a person and how it changes your mind.
or
I had always planned to involve my art in my capstone. 
Use the filters below to narrow your results.
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
In my capstone I will talk about the different mediums that I explored during my time at TSAS. I also included various figures that inspired me along the way. (1) ·
My project is basically talking about how social media changes our brains and how we deal with those changes. It talks about many statistics and studies that scientists and universities have done on the brain itself. (1)
Although capstone did take an unexpected turn, it wasn't difficult to adjust to the new changes. (1) ·
I had to change my Capstone some. I was going to interview people about how social media effects them specifically, but that obviously wasn’t able to happen. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I reflected over the numerous art mediums that I wouldn't have tried if I hadn't gone to TSAS. (1) ·
I’m glad that I did something I was genuinely interested in. I use social media frequently so I was curious about the studies done on it. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

