K2’s AI – Better Prompts, Better Results
Information Technology
1 CPE Credits

Major Topics
- Components of effective AI prompts
- The pros and cons of a single large prompt versus multiple small prompts
- Using prompts to format AI-generated output
Learning Objectives
- List the four key components of AI prompts
- Identify examples of prompts used for tasks, context, expectations, and output
- Name at least four types of tasks generative AI tools can do when prompted correctly
Description
Generative AI is seemingly everywhere, and business professionals are embracing the technology. And for a good reason – generative AI provides opportunities for enormous gains in efficiency and productivity. However, those gains can be even greater if you understand best practices for issuing AI prompts.
In this session, you will learn the best ways to ask questions of your AI platforms so that you get the information you seek quickly and easily. Stop wasting time with inefficient and ineffective prompts! Learn the best ways to get the information you seek!
Compliance Information
Overview
Generative AI is seemingly everywhere, and business professionals are embracing the technology. And for a good reason – generative AI provides opportunities for enormous gains in efficiency and productivity. However, those gains can be even greater if you understand best practices for issuing AI prompts.
In this session, you will learn the best ways to ask questions of your AI platforms so that you get the information you seek quickly and easily. Stop wasting time with inefficient and ineffective prompts! Learn the best ways to get the information you seek!
Course Details
- Understanding the differences between data security and data privacy
- The major types of security and privacy breaches
- Key steps you can take to mitigate your risks of becoming another victim
- Identify at least five examples of common data security and privacy issues affecting businesses today
- Create estimates of the costs associated with data security and privacy breaches
- List examples of internal control best practices you can use to mitigate your security and privacy risks
Intended Audience — Update this attribute value to the course desired audience.
Advanced Preparation — None
Field of Study — Information Technology
Credits — 2 Credits
IRS Program Number –
Published Date – January 1, 2025
Revision Date –