We're excited to be creating more content for you! Additional modules are being added regularly.
Let's walk through the process of creating technical documentation for a new software feature, seeing how different prompt engineering techniques work together to achieve precise, accurate results.
AI: What can I help with? | |
You: I need to create documentation for a new user authentication feature. Before we begin, I'd like you to act as a technical writer with experience in API documentation. Can you confirm this role and let me know what initial information you'll need? | |
AI: Yes, I'll approach this from the perspective of a technical writer specializing in API documentation. To create comprehensive documentation, I'll need: 1. The feature's core functionality 2. Target audience (developers, end-users, admins?) 3. Required technical prerequisites 4. Expected documentation format/style guide |
|
You: Thank you. Here's what I can provide: 1. It's a two-factor authentication system for our REST API 2. This is for third-party developers integrating our API 3. Users need basic REST API knowledge and our API key 4. We use OpenAPI/Swagger format with markdown |
|
AI: Understood. I'll structure the documentation following OpenAPI standards for a 2FA REST API integration, aimed at developers with REST experience. Would you like to start with the endpoint specifications or the implementation guide? |
Why We Did This:
You: Let's start by defining our documentation structure. Here's our standard format: # [Endpoint Name] ## Authentication Requirements ## Request Format ## Response Format ## Example Usage ## Error Handling Can you confirm this structure and suggest any additions specific to 2FA? |
|
AI: I understand the structure. For 2FA documentation, I recommend adding these sections: # [Endpoint Name] ## Authentication Requirements - Base API authentication - 2FA-specific headers ## Request Format - Endpoint URL - HTTP Method - Required parameters ## Response Format - Success response - Verification required response ## Implementation Steps - Initial request flow - Verification flow - Session management ## Example Usage - Initial authentication - Verification process ## Error Handling - Error codes - Troubleshooting ## Security Considerations - Token lifecycle - Rate limiting - Security best practices Would you like me to explain the rationale for these additions? |
Why We Did This:
While this conversation was broken down into individual sections that we could focus on, the whole thread would look be much longer. We added spaces between each of the sections in the thread below so you can see where it was broken down.
AI: What can I help with? | |
You: I need to create documentation for a new user authentication feature. Before we begin, I'd like you to act as a technical writer with experience in API documentation. Can you confirm this role and let me know what initial information you'll need? | |
AI: Yes, I'll approach this from the perspective of a technical writer specializing in API documentation. To create comprehensive documentation, I'll need: 1. The feature's core functionality 2. Target audience (developers, end-users, admins?) 3. Required technical prerequisites 4. Expected documentation format/style guide |
|
You: Thank you. Here's what I can provide: 1. It's a two-factor authentication system for our REST API 2. This is for third-party developers integrating our API 3. Users need basic REST API knowledge and our API key 4. We use OpenAPI/Swagger format with markdown |
|
AI: Understood. I'll structure the documentation following OpenAPI standards for a 2FA REST API integration, aimed at developers with REST experience. Would you like to start with the endpoint specifications or the implementation guide? | |
You: Let's start by defining our documentation structure. Here's our standard format: # [Endpoint Name] ## Authentication Requirements ## Request Format ## Response Format ## Example Usage ## Error Handling Can you confirm this structure and suggest any additions specific to 2FA? |
|
AI: I understand the structure. For 2FA documentation, I recommend adding these sections: # [Endpoint Name] ## Authentication Requirements - Base API authentication - 2FA-specific headers ## Request Format - Endpoint URL - HTTP Method - Required parameters ## Response Format - Success response - Verification required response ## Implementation Steps - Initial request flow - Verification flow - Session management ## Example Usage - Initial authentication - Verification process ## Error Handling - Error codes - Troubleshooting ## Security Considerations - Token lifecycle - Rate limiting - Security best practices Would you like me to explain the rationale for these additions? |
Throughout this conversation, we've seen several prompt engineering techniques specific to technical documentation. Like a well-designed API, each technique serves a specific purpose while contributing to the overall system. Let's break down the key techniques:
Looking back at our conversation, we can see how each technique contributed to the final result:
Most importantly, these techniques worked together to create documentation that is both technically accurate and practically useful.
Choose a technical feature to document and follow this pattern:
Now that you've completed this practice experience, be sure to check out the next example!