Alphabet Schools is in it's infancy. I am not! I spent 9 years helping build Vschool.

I will level you up quick to land you a job in tech. All courses are 1 month long and $2000. Or $500 a week.

click here to see the future!


Alphabet Schools will be able to house friends that I trust. People love teaching, but teachers are treated poorly by administation.

Alphabet Schools hopes to take administators and makes them instructors. They won't have to feel like they need to justify their job, or impose themselves on other's times and projects, unless the intent is to provide an education the student agreed to.

We'll focus on having students work on product as the most practical ways to practice what they're learning.

The product? Their own curated social online experice.

Teaching simple ways to deploy individuals content to the web IS the way to break free of social media giants.

Schools already started: v z RN - schools still left to claim: a b c d e f g h i j k l m n o p q r s t u w x y

Natural Language Code Prompting

Web Dev Front End

Web Dev Full Stack (front end required)

Python

Cyber Certifications

CompTIA A+

CompTIA Net+

CompTIA Sec+

click here to take my aptitude test to see which course is right for you!


Web Development Aptitude Test

1. Which of the following is the correct output of the following Python code snippet?

x = "hello"

print(x[1:4])

a) olleh
b) h:l
c) ell
d) hlo
c) ell
2. In a certain code language, "CAT" is written as "FZG". How is "DOG" written in that code language?
a) GZJ
b) GZK
c) HPK
d) GYK
d) GYK
3. What is the result of the expression 9 + 3 * 2 / 3 - 1?
a) 9
b) 10
c) 6
d) 5
b) 10
4. Which of the following sorting algorithms typically has the best average-case time complexity?
a) Quick Sort
b) Merge Sort
c) Insertion Sort
d) Bubble Sort
a) Quick Sort
5. What does the `length()` method return when called on a string variable in Java?
a) The number of characters in the string
b) The capacity of the string buffer
c) The number of bytes used to represent the string
d) Compilation error
a) The number of characters in the string
6. What is the result of evaluating the expression `5 * (7 - 2)+ 3`?
a) 28
b) 30
c) 25
d) 35
b) 30
7. Which of the following statements about trees is false?
a) Trees are hierarchical data structures.
b) Each node in a tree can have multiple children.
c) Trees can only be traversed in one direction.
d) Trees can be used to represent hierarchical relationships.
c) Trees can only be traversed in one direction.
8. In a queue containing elements A, B, C, D, E, if you remove elements in FIFO (First In First Out)order, which element is removed first?
a) A
b) B
c) C
d) D
a) A
9. What is the value of `2 ** 3` in Python?
a) 8
b) 6
c) 5
d) 16
a) 8
10. If a function f(x)is defined as f(x)= x^2 + 3x - 2, what is the value of f(2)?
a) 6
b) 8
c) 10
d) 12
b) 8

Cyber Certs Aptitude Test

You shouldn’t need to know the answers to this test. You will have to find them in the questions and answers.

Welcome to the Cybersecurity Aptitude Test! This test is designed to assess your potential for success in our cybersecurity course. We understand that you may not have taken any cybersecurity courses yet, but don’t worry – this test is meant to evaluate your analytical skills, critical thinking, and problem-solving abilities.

To answer these questions, try to apply your general knowledge, common sense, and intuition. The questions touch on various aspects of cybersecurity, but you don’t need to be an expert to answer them. Think about each question carefully and consider how it relates to the principles of security, privacy, and technology. Remember that the goal is not to test your existing knowledge but to evaluate your aptitude for learning and understanding complex cybersecurity concepts and test taking.

As you work through the test, try to eliminate options that seem less likely or less relevant to the context of the question. Look for clues in the question itself or the structure of the answers. Trust your instincts and make educated guesses when necessary. This test is not about perfection; it’s about discovering your potential to excel in the cybersecurity field. We encourage you to take your time, stay focused, and enjoy the challenge. Good luck, and we hope to see you in the program that works best for you!

1. Jane has a folder that contains twenty-five 80 MB files. She wants to store the folder on a 2 GB USB drive. How much space would remain on the USB drive after storing the folder?

a) 0 MB

b) 400 MB

c) 800 MB

d) 1,200 MB

b) 400 MB
2. What is the purpose of an IP address?

a) An internet search engine

b) A software programming language

c) A unique identifier for devices on a network

d) A type of computer virus

d) A unique identifier for devices on a network
3. Explain the difference between a virus, worm, and trojan.

a) A virus is a type of malware that can self-replicate and spread to other computers, while a worm is a type of malware that can also self-replicate but spreads through networks. A trojan is a type of malware that disguises itself as a legitimate program or file but secretly carries out malicious actions.

b) A virus is a type of malware that causes minor system slowdowns, while a worm is a type of malware that leads to major system crashes. A trojan is a type of malware that steals personal information without causing any noticeable effects on the system.

c) A virus is a type of software that helps protect your computer from malicious threats, while a worm is a type of software that optimizes your computer's performance. A trojan is a type of software that provides remote access to your computer for technical support purposes.

d) A virus is a type of computer program that displays unwanted advertisements, while a worm is a type of program that secretly monitors your online activities. A trojan is a type of program that helps recover lost or deleted files.

a) A virus is a type of malware that can self-replicate and spread to other computers, while a worm is a type of malware that can also self-replicate but spreads through networks. A trojan is a type of malware that disguises itself as a legitimate program or file but secretly carries out malicious actions.
4. Describe the function of a DHCP (Dynamic Host Configuration Protocol) server in a network.

a) A DHCP server is used to connect a network to the internet.

b) A DHCP server is used to manage and assign IP addresses and other network configuration information to devices on a network.

c) A DHCP server is used to monitor network traffic and identify potential security threats.

d) A DHCP server is used to store data that can be accessed by all devices on a network.

b) A DHCP server is used to manage and assign IP addresses and other network configuration information to devices on a network.
5. What is the difference between RAM(Random Access Memory) and ROM(Read-only memory)?

a) RAM is a type of processor, while ROM is a type of storage.

b) RAM is a type of storage that can be rewritten, while ROM is a type of storage that cannot be rewritten.

c) RAM and ROM are both types of storage, but RAM is faster.

d) RAM and ROM are both types of storage, but ROM is faster.

b) RAM is a type of storage that can be rewritten, while ROM is a type of storage that cannot be rewritten.
6. You are given 9 8 balls and a weighing scale (scales of justice style scale). One of the balls weighs slightly more or less than the other 7, but you don't know which one. You can use the scale only twice. How can you determine which ball is different and whether it weighs more or less than the other balls?

a) start by weighing two sets of four to determine if it’s in either set of 4, or it was in the one left out

b) Start by weighing half

c) Create 3 groups of 3 8 balls, and weigh 2 of the three on either side of the scale to determine if it’s one of those or the third

d) Use the bar on the scale to balance marbles and see how they roll

c) Create 3 groups of 3 8 balls, and weigh 2 of the three on either side of the scale to determine if it’s one of those or the third
7. What is a DNS(Domain Name System) server?

a) A type of anti-virus software

b) A server that translates domain names into IP addresses

c) A server that blocks websites that contain malicious content

d) A server that stores data backups

b) A server that translates domain names into IP addresses
8. What is the difference between a LAN(Local Area Network) and a WAN(Wide Area Network)?

a) A LAN is a type of wireless network while a WAN is a type of wired network.

b) A LAN is a network that is located in a single building or campus while a WAN is a network that spans a larger geographic area.

c) A LAN is a network that is used for personal use while a WAN is a network that is used for business.

d) A LAN is a network that is used for wired connections while a WAN is a network that is used for wireless connections.

b) A LAN is a network that is located in a single building or campus while a WAN is a network that spans a larger geographic area
9. What is a VPN(Virtual Private Network)?

a) A type of anti-virus software

b) A type of malware that steals personal information

c) A network connection that allows users to access a private network securely over the internet

d) A type of encryption used to secure email communication

c) A network connection that allows users to access a private network securely over the internet
10. What is a patch?

a) A type of malware that exploits software vulnerabilities

b) A type of software update that fixes security vulnerabilities and bugs

c) A type of software that allows for remote access to a computer

d) A type of anti-virus software

b) A type of software update that fixes security vulnerabilities and bugs
11. What is social engineering?

a) A type of encryption used to secure wireless networks

b) A type of attack that uses physical force to gain access to a network

c) A type of attack that exploits human psychology to gain access to sensitive information

d) A type of virus that spreads through social media platforms

c) A type of attack that exploits human psychology to gain access to sensitive information
12. What is a packet?

a) A type of malware that steals personal information

b) A unit of data that is transmitted over a network

c) A type of encryption used to secure data transfers

d) A type of hardware used to connect devices to a network

b) A unit of data that is transmitted over a network
13. What is a honeypot?

a) A type of network security tool that detects and prevents malicious activity

b) A type of anti-virus software

c) A type of network that is used for testing purposes

d) A decoy system or network resource designed to attract and detect potential cyber attackers.

d) A decoy system or network resource designed to attract and detect potential cyber attackers.
14. If you want to measure the speed at which your computer can send and receive data over a network, which unit should you use?

a) Hertz (Hz)

b) Bits per second (bps)

c) Bytes (B)

d) Watts (W)

b) Bits per second (bps)
15. To maintain your laptop's battery health, it's advised to avoid letting the battery drain completely. What is the optimal discharge level before recharging to prolong battery life?

a) 0-10%

b) 20-30%

c) 40-50%

d) 60-70%

a) 0-10%


Classes will be held every weekday morning.

Topics and associated assignments are scheduled for the first 15 days.

Intense real world application will be practiced the last week of each course.

Previously created and hosted course material will be paid for by your tuition, and I will guide you through it.

If you are a minority, you get half off tuition. Women also get half off. That's 75% off full price for some. In return, I get gentle reminders when my speech or actions could be more sensitive.

If you are a white dude butt hurt about that deal, I don't really gaf. Do a double (triple if it's a cliff jump), and then we'll talk about getting you in cheap.
I know these are weird criteria, but I want to make sure I attract like minded individuals to my school. If you disagree with me, come at me please. Alphabet School will be a place of free speech and challenging each other's thinking. We'll attempt to interpret what everyone is saying in the best way.

801.997.0379

alphaschoolbet@gmail.com