Drilldown: CapGrads
Use the filters below to narrow your results.
A slide show of some of the topics I went through in the TulsaTech class "Cyber security and forensics." Though it may not be the most polished thing in the world, I wanted to at least make the average computer/phone user aware of the different types of security threats that one could face while onl (1) ·
I chose my senior capstone to be about photography and my progression within that. I’ve picked up technical shooting skills and am building a portfolio. To help further my enrichment in my Capstone, I took two photography classes this year. I worked hands-on with Ms. Butcher, brushing up on my com (1) ·
It's a website filled with my darkroom and digital photography. Visit my website [https://joylynnsmetana.wixsite.com/joylynnsphotography here]. (1)
A sort of TED talk like presentation. (1) ·
I was going to be volunteering at a local children’s museum. My capstone about this was to discuss the importance and livelihood of service to the community. (1) ·
It started as a self love project, but over time I realized that it wouldn't be possible to finish in quarantine. So, I decided to make a photography website (1)
Due to lack of enrichment and work, I decided to change my capstone to photography. Luckily enough, I had already been attending a photo class. Ms. Butcher took me under her wing right away to help brainstorm and envision how to build a portfolio and give an artist statement. (1) ·
I completely started over and changed my entire project. (1) ·
Things didn't go exactly as planned, of course as stated many times it's not the most polished thing in the world but I feel like I could have maybe added more. (1)
I was overworking myself and took on too big of a workload. (1) ·
Our generation sadly cares more about passing than learning, though I don’t know who’s fault it is. (1) ·
While going to the Tulsa Tech for this capstone, I've learned many different things. Sure there was the initial cyber security, but I've also learned small bits of networking, and operating systems. Mainly different types of cyber attacks as shown in the slideshow, but also different types of connec (1)
Showing below up to 3 results in range #1 to #3.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)


