Drilldown: CapGrads
Use the filters below to narrow your results.
Be prepared for anything and no matter the lack of motivation, there is always something to look forward to. (1) ·
If anybody wants to do a virtual prom that would be cool—class of 2020 is not over yet! Keep your head up high and....WASH YO HANDS!!!! (1) ·
Make a plan at the beginning of the year, see if it is possible or acceptable, see how everything is going to work, and give it your best. (1)
A resource website, gallery and poetry demonstration, that was all transferred and adapted into a website that can be freely explored by the user. The resources include legal and health services for those who do not have documentation, but also include local Mexican-owned businesses to support. Also (1) ·
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
Pictures and videos of me talking about my experience and what my time at the Children's Museum was all about. (1)
I made everything available to the public online and made a media out of it. It was actually better than I imagined and far more accessible. (1) ·
The video was a complete 180 from what I was going to do, which was a bulletin board, but I think it turned out pretty well. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I learned to tackle my computer better. I learned how to make a website and that was not really what I had in mind, but I came out with a better outcome from this. It was trial and error. (1) ·
That I might want to work with children as a career. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)


