Enter: Prompt Scribe
Prompt Scribe writes prompts that just work. Optimized over 10,000+ test-cases. Results enclosed.
Stop Fighting Your AI. Start Getting Results.
How many times have you prompted your favorite AI chat model with what you thought was enough context, only to be left hanging by the genie in the bottle? Too many times to recall? Yeah, me too.
How did I solve this problem? Let me show you.
18 months ago I began using AI to write better academic essays at Stevens Institute of Tech. Shortly after, I spent 6 months at Apple introducing users to Apple Intelligence. What I learned about the way people intuitively approach AI got me thinking about how to better bridge the communication gap.
Driven by curiousity, I developed a predictable and effective method of prompting that allowed me to quickly forward my work, buying me back time, all the while helping me to incorporate new findings as they came to mind. I fell in love with this type of work, and haven’t stopped since.
On Writing in Cooperation with AI
Now, ideas for research which I would have previously brushed off as unrealistic are immediately actionable. This system enables me to retrieve and analyze more research data, such as full scientific articles, in less time.
With the right instruction and contextualization, thanks to Prompt Scribe, Claude, ChatGPT, Gemini and similar AI large language models became powerful tools for the immediate generation of customized, highly actionable assets. From market/sentiment analysis, to image generation frameworks, to dialectic analysis of PDFs, Prompt Scribe delivers.
The impact of AI on my academic work was clear, and finally, I was able to put my concepts on the page in full. The truth is, AI was intstrumental in the planning for all of my university classes.
I may have written the final draft, but AI was the loom. The potential for that technology is still unrealized, but today I am proud to present the product of all of my research thus far.
Convenience is Everything
Prompt Scribe handles all the technical prompt engineering behind the scenes. It's like having a personal AI whisperer that makes every tool you use work better, whether that's ChatGPT, Claude, or whatever comes next.
I’m bringing the insight behind Prompt Scribe straight to you. Are you tired of fighting your AI? You're not alone. And you're not doing it wrong.
There's a translation problem between how humans naturally communicate and how AI understands instructions. Most of us don't even realize this gap exists—we just know our AI tools aren't living up to their promise.
Even prompt engineers google "how to make Claude less formal" at 2 AM. The truth is, AI is a black box. Even world experts can’t fully know what goes on inside. That doesn’t mean we can’t still take advantage of this technology.
We're all just figuring this out as we go. The difference with Prompt Scribe is prompts that lead to a predictable output.
How it Works
Prompt Scribe is a translator between how humans naturally communicate and how AI systems work best.
It takes your plain English request and automatically restructures it with the specific formatting, context, and instructions that make AI perform at its peak. Think of it like having a really good interpreter who knows both languages perfectly.
Here’s a generic prompt for example: (Hint: this prompt uses placeholders for example’s sake, but placeholders can be a critical tool to the savvy prompter)
<role>
You are a [EXPERT_TYPE] with expertise in [DOMAIN].
</role>
<context>
[BACKGROUND_INFO] for [PURPOSE].
</context>
<task>
[SPECIFIC_ACTION] that:
- [REQUIREMENT_1]
- [REQUIREMENT_2]
- [CONSTRAINT]
</task>
<output>
Format: [STRUCTURE]
Length: [SPECIFICATION]
Include: [ESSENTIAL_ELEMENTS]
</output>
Prompt Example: Classroom Lesson Plan
Given this casual input: "Help me write a lesson plan about digital privacy and cybersecurity," followed by the context provided by your model, Prompt Scribe transforms that into something like:
# Interactive Lesson Plan Creation: Digital Privacy & Security Workshop
## System Role Definition
<system_role>
You are functioning as an expert educational designer specializing in technology education and adolescent learning. Your expertise includes instructional design, digital citizenship curriculum, age-appropriate pedagogy for teenagers, and hands-on learning methodologies. Your responses should reflect deep understanding of both educational theory and practical classroom management.
</system_role>
## Educational Context
<context>
Target Course: 90-minute "Digital Privacy and Security" workshop
Student Demographics: High school students (ages 16-18), 25-30 per class
Prior Knowledge: Basic computer skills, limited privacy awareness
Curriculum Integration: Part of broader digital citizenship program
Learning Environment: Computer lab with individual devices and internet access
Pedagogical Approach: Interactive, hands-on learning with minimal lecture time
</context>
## Learning Objectives Framework
<objectives>
By workshop completion, students will demonstrate ability to:
1. **Identify**: Recognize at least 5 specific ways personal data is collected online (Knowledge)
2. **Differentiate**: Explain privacy vs. security concepts with real-world examples (Comprehension)
3. **Configure**: Successfully adjust privacy settings on 2+ social media platforms (Application)
4. **Create**: Generate and implement strong passwords using password managers (Application)
5. **Evaluate**: Identify phishing attempts and scam tactics with 80%+ accuracy (Analysis)
</objectives>
## Design Constraints
<constraints>
Time Allocation:
- Total duration: 90 minutes (including 10-minute break)
- Maximum lecture segments: 10 minutes each
- Minimum hands-on time: 50 minutes total
Technical Requirements:
- Individual laptop/tablet access with internet
- Compatible with major browsers and mobile devices
- Account creation capabilities (email required)
Engagement Requirements:
- Student participation every 5-7 minutes
- Multiple interaction modalities (individual, pair, group)
- Assessment integrated throughout (no formal testing)
- Real-world application emphasis
Class Management:
- Accommodates 25-30 students
- Flexible for different skill levels
- Includes contingency plans for technical issues
</constraints>
## Content Development Instructions
<instructions>
Create a comprehensive, implementable lesson plan by following this systematic approach:
**Phase 1: Structure Design**
1. Develop minute-by-minute timeline with buffer time for transitions
2. Balance instruction, practice, and reflection using 20/60/20 ratio
3. Include natural break points and energy management strategies
4. Plan for differentiated instruction and varying completion speeds
**Phase 2: Engagement Strategy**
1. Design an opening hook that reveals students' current digital footprint
2. Create discovery-based activities where students uncover privacy risks
3. Include peer collaboration and knowledge sharing opportunities
4. Incorporate competitive elements (privacy challenges, skill races)
**Phase 3: Practical Application**
1. Provide step-by-step guidance for platform-specific privacy settings
2. Include real phishing examples from current threats targeting teens
3. Design password creation exercises with immediate feedback
4. Create scenarios reflecting students' actual online behaviors
**Phase 4: Assessment Integration**
1. Build formative checkpoints every 15-20 minutes
2. Use demonstrable skills over verbal responses
3. Include peer evaluation and self-reflection components
4. Design exit assessment measuring all five learning objectives
</instructions>
## Required Output Components
<output_format>
**Section A: Lesson Overview**
- Executive summary (2-3 sentences)
- Learning objectives mapped to activities
- Materials and technology requirements checklist
- Pre-lesson preparation instructions for instructor
**Section B: Detailed Timeline**
Format as table with columns:
- Time Range | Activity Name | Learning Objective | Instructor Actions | Student Actions | Assessment Method
**Section C: Activity Instructions**
For each hands-on component, provide:
- Setup requirements and troubleshooting tips
- Step-by-step student instructions with screenshots/examples
- Instructor facilitation notes and common student questions
- Differentiation strategies for advanced/struggling learners
- Time management and pacing guidance
**Section D: Assessment Tools**
- Formative assessment questions with expected responses
- Practical skill evaluation rubrics
- Exit ticket template with reflective prompts
- Follow-up assignment options connecting to real life
**Section E: Supporting Resources**
- Direct links to tools, websites, and platforms
- Downloadable handouts and reference materials
- Extension activities for fast finishers
- Parent/guardian communication template about skills learned
</output_format>
## Quality Validation Criteria
<quality_standards>
The lesson plan should demonstrate:
- **Practicality**: Another educator could successfully implement without additional resources
- **Engagement**: Students actively participate throughout, not passive recipients
- **Relevance**: Content directly applies to students' current digital behaviors
- **Measurability**: Clear evidence students have achieved learning objectives
- **Flexibility**: Adaptable for different class sizes, tech setups, and time constraints
- **Currency**: Incorporates recent privacy threats and platform updates
Avoid:
- Lecture-heavy segments exceeding 10 minutes
- Activities requiring account creation on unfamiliar platforms
- Technical complexity that could derail lesson flow
- Content that feels disconnected from teen experiences
</quality_standards>
## Example Activity Format
<example_activity>
**Activity Name**: "Privacy Settings Audit Challenge"
**Duration**: 20 minutes
**Objective**: Configure privacy settings on personal social media accounts
**Student Instructions**:
1. Access your Instagram account settings
2. Navigate to Privacy settings using [specific path]
3. Document current settings using provided checklist
4. Adjust 5 settings following security recommendations
5. Screenshot final configuration for verification
**Instructor Notes**:
- Circulate during activity to assist with navigation
- Common issue: Students may not remember passwords
- Extension: Have students explain one setting change to a partner
- Assessment: Quick visual check of student screens
**Troubleshooting**:
- If student lacks Instagram account, pair with someone who has one
- Provide alternative platform options (TikTok, Snapchat paths)
</example_activity>
## Execution Instructions
<execution_guidance>
When developing this lesson plan:
1. **Start with the opening hook** - make it immediately relevant and surprising
2. **Design backward from assessments** - ensure activities directly support measurable outcomes
3. **Include buffer time** - technology integration always takes longer than expected
4. **Plan for the unexpected** - include backup activities and contingencies
5. **Test all links and tools** - verify everything works before including
6. **Consider the human element** - anticipate questions, concerns, and resistance
If any aspect of these requirements seems unclear or potentially problematic for the target audience, please flag these concerns and suggest alternatives within your response.
</execution_guidance>
It’s actually that simple. You get exactly what you wanted instead of something you have to rewrite three times. Here’s a snippet of what ChatGPT (while logged out) returned to me when I gave it the above prompt »1 « .
I’m sure you’re wondering how predictable it is. Let’s find out! Go ahead, try it yourself. Feel free to share your thoughts and findings in the comments, or better yet, join the chat.
Welcome to Prompt Scribe — Here’s What You'll Get Each Week
Real prompts that solve real problems. This is the kind of prompting that works in the real world.
As a free subscriber, you'll get:
Essential prompt templates you can use immediately
The story behind why they work (usually involving my embarrassing failures)
Specific examples across different AI platforms
Quick prompts you can implement in one click
What you get with a Prompt Scribe Subscription
Customizable industry-specific templates
Custom prompt requests
Weekly deep dives
Monthly consultations
Inquire today to learn more about what Prompt Scribe templates can do for you: inquire@armenberenson.com
Principles
Everything I share here comes from real testing with real people solving real problems.
I'm not selling courses or promising AI will replace you. I'm just sharing what I've learned from thousands of experiments so you don't have to repeat my mistakes.
Subscribe for free and get immediate access to my starter pack of 10 prompts that work across any AI platform. These alone will save you hours of frustration.
Because life's too short to fight with your AI tools when they could be helping you get actual work done.
What's the most unsuccessful request you've asked AI? Join the chat and tell us—I collect these stories for research (and entertainment).
Thanks for reading. Subscribe for free to receive new prompts and tips daily.
[PROMPT 1 OUTPUT]
Section A: Lesson Overview
Executive Summary
This 90-minute workshop on Digital Privacy and Security aims to equip high school students with essential skills to protect their personal information and navigate the digital world securely. Through a combination of hands-on activities, interactive discussions, and real-world examples, students will learn to manage privacy settings, identify online threats, and implement best practices for digital security. The workshop will focus on practical, immediate-use skills like adjusting privacy settings, creating strong passwords, and recognizing phishing attempts. Learning Objectives Mapped to Activities
Identify: Recognize at least 5 ways personal data is collected online.
Activity: "Data Collection Detective"
Differentiate: Explain privacy vs. security concepts.
Activity: "Privacy vs. Security Debate"
Configure: Adjust privacy settings on 2+ social media platforms
Activity: "Privacy Settings Audit Challenge"
Create: Generate and implement strong passwords using password managers.
Activity: "Strong Password Challenge"
Evaluate: Identify phishing attempts and scam tactics.
Activity: "Phishing Scam Hunt"
Materials and Technology Requirements Checklist
Laptops/tablets with internet access for each student
Access to social media accounts (Instagram, Facebook, TikTok, or Snapchat)
Password manager tool (LastPass, Bitwarden, or similar)
Projector for screen sharing
Handouts: Privacy Settings Checklist, Phishing Examples
Links to real-time phishing simulations
Pre-Lesson Preparation Instructions for Instructor
Test all tools: Verify that all websites and apps are accessible, and that password manager tools are set up for student use.
Create sample social media accounts (if students don't have accounts).
Prepare handouts: Print or share digital links to the "Privacy Settings Checklist" and "Phishing Examples" sheets.
Set up a phishing simulation: Use a tool like "Phishing Quiz" or create a set of examples based on current phishing scams targeting teens.
Section B: Detailed Timeline
Time Range Activity Name Learning Objective Instructor Actions Student Actions Assessment Method 0-5 min Opening Hook: "Digital Footprint Reveal" Identify: Recognize ways personal data is collected Brief intro on digital footprints, present a privacy fact or shocking statistic Reflect on their digital habits, share in pairs Quick show of hands-on common data collection methods 5-15 min "Data Collection Detective" Identify: Recognize at least 5 ways personal data is collected Present 5 real-world methods of data collection (cookies, trackers, social media, etc.) Work in pairs to identify how data is collected on popular platforms Pair discussions and spot-checking for accuracy 15-25 min "Privacy vs. Security Debate" Differentiate: Explain privacy vs. security concepts Present brief explanation of privacy and security with examples Debate in small groups, then share with the class Peer feedback, monitor understanding of differences 25-40 min Privacy Settings Audit Challenge Configure: Adjust privacy settings on 2+ platforms Show examples of social media privacy settings (Instagram, TikTok) Adjust privacy settings on their accounts, document changes Screen check, peer review of settings 40-50 min BREAK N/A Encourage students to stretch, hydrate, and reflect Socialize and take a break N/A 50-65 min "Strong Password Challenge" Create: Generate and implement strong passwords Demo how to create a secure password and set up a password manager Create a strong password using the password manager tool Verify passwords and review any common mistakes 65-80 min "Phishing Scam Hunt" Evaluate: Identify phishing attempts with 80%+ accuracy Show examples of real phishing emails and common scam tactics Analyze and identify phishing emails in small groups Group discussions, check for correct identification 80-90 min Wrap-up and Exit Ticket Review: Reflect on key learnings Summarize the session, answer final questions Fill out exit ticket with reflections Review exit tickets for understanding
Section C: Activity Instructions
Activity 1: "Data Collection Detective"
Duration: 10 minutes
Objective: Identify how personal data is collected online
Setup Requirements:
Projector for showing examples of data collection methods
Handout with examples of data collection methods (cookies, trackers, location data, etc.)
Step-by-Step Student Instructions:
Review the handout on common ways data is collected online.
In pairs, choose a popular app or website (Instagram, TikTok, Facebook, etc.).
Discuss how that platform collects and uses your data (e.g., targeted ads, location tracking).
Prepare to share your findings with the class.
Instructor Notes:
Move around to check student progress and assist with discussions.
Common student questions: “How does a platform track me if I’m not signed in?” Answer: "They use cookies and browsing data."
Extension: Have students research and present one way they can protect their data on the selected platform.
Differentiation:
Advanced learners can analyze multiple platforms and compare data collection methods.
Struggling learners can work with a peer to identify data collection on one platform.
Time Management:
Keep the discussion to 4 minutes to ensure everyone has time to share findings.
Activity 2: "Privacy Settings Audit Challenge"
Duration: 20 minutes
Objective: Adjust privacy settings on 2+ social media platforms
Setup Requirements:
Students need accounts on Instagram, Facebook, or TikTok
Privacy settings checklist handout
Laptop/tablet access
Step-by-Step Student Instructions:
Open the settings page of your social media platform.
Follow the checklist to review and adjust your privacy settings (e.g., profile visibility, data sharing preferences, ad targeting).
Take a screenshot of your final privacy settings for submission.
Instructor Notes:
Circulate to provide support for students who may forget their login details or struggle with navigating settings.
Common issues: Students may not have accounts on all platforms—have them partner up or use a provided demo account.
Encourage students to explore privacy features not covered in the checklist.
Differentiation:
Students unfamiliar with the platform can be paired with more experienced students.
Students with previous knowledge can be challenged to adjust additional settings or apply more advanced privacy techniques.
Time Management:
Keep the pace moving, but allow extra time for troubleshooting.
Section D: Assessment Tools
Formative Assessment Questions:
Data Collection: "What is one way a website collects your data without you even knowing?"
Expected Response: "Cookies track what you search and view online."
Privacy vs. Security: "Explain the difference between privacy and security using a social media example."
Expected Response: "Privacy is about controlling who sees your posts; security is about protecting your account from hackers."
Password Strength: "Why should you use a password manager instead of saving passwords in your browser?"
Expected Response: "A password manager keeps your passwords encrypted and more secure than the browser’s storage."
Phishing: "If you receive an email asking for your password, what should you do?"
Expected Response: "Ignore the email, check for signs of phishing, and never click on suspicious links."
Practical Skill Evaluation Rubrics:
Privacy Settings Audit:
Level 1 (Needs Improvement): Did not adjust privacy settings or incomplete settings.
Level 2 (Proficient): Adjusted some settings but missed key privacy features.
Level 3 (Advanced): Fully adjusted all relevant privacy settings and provided explanations.
Password Creation:
Level 1: Password is weak (e.g., short, predictable).
Level 2: Password meets basic security criteria (e.g., length, complexity).
Level 3: The password is complex and unique, stored securely in a password manager.
Exit Ticket Template:
What is one new thing you learned today that you will apply to your online life?
How confident are you in your ability to spot phishing scams after this workshop? (Scale of 1-5)
What is one way you will improve your privacy settings or online security today?
Section E: Supporting Resources
Tools: LastPass, Bitwarden, Phishing Quiz
Handouts:
Privacy Settings Checklist
Examples of Phishing Emails
Extension Activities:
Have students create a detailed report on the most common digital privacy risks for teenagers today.
Challenge students to teach a family member or friend how to adjust their privacy settings.
Parent/Guardian Communication Template:
"Dear Parent/Guardian,
Today, your student learned critical skills in managing their digital privacy and security. They are now equipped to adjust privacy settings on social media platforms, create stronger passwords, and spot phishing attempts. Encourage your student to share what they've learned and apply it to their online activities."