Analyze Answers
Analysis PromptsAnalyze answers to evaluate their correctness, adapting the evaluation to the student level.
Data synthesis, market research, and competitive breakdowns that surface insights fast.
Browse 144+ prompts by role, platform, task, or industry.
Prompts for Marketers
Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO
Prompts for Sales Teams
Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials
Prompts for Developers
Agility Story · Analyze Tech Impact · Explain Code
Email Prompts
Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md
Writing Prompts
Agility Story · Answer Question · Analyze Prose
Coding Prompts
Master Therapist Prompt · Agility Story · Coding Master
Analysis Prompts
Answer Question · Analyze Answers · Analyze Claims
Creative Prompts
Agility Story · Answer Question · Brainstorm Ideas Customer Pain
Business Prompts
Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan
Prompts for Founders
Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business
Analyze answers to evaluate their correctness, adapting the evaluation to the student level.
Analyze claims by identifying biases, inconsistencies, and logical fallacies in the provided text. Provide a detailed breakdown of the arguments, including evidence and reasoning used to support or refute the claims.
Evaluate debates by mapping claims, analyzing arguments neutrally, and scoring their insightfulness and emotionality. Provide a detailed breakdown of participants' arguments, agreements, disagreements, misunderstandings, learnings, and actionable takeaways.
Analyze the concept of ikigai by identifying its core elements and evaluating its relevance in modern life. Extract key findings and insights into how ikigai can be applied to achieve personal fulfillment and purpose.
Extract key details from cybersecurity incident articles, focusing on concise, organized data about attack dates, types, and impacted entities. Include specific information on attackers, vulnerabilities, and remediation steps, prioritizing direct use of the article's content.
Analyze logs to identify patterns and anomalies, ensuring server reliability and performance by thoroughly examining log entries and providing data-driven insights. Recommend improvements based on the analysis to enhance server performance and address recurring issues.
Analyze malware to understand its functionality and potential impact on various platforms, including Windows, macOS, Linux, and Android. This involves dissecting the malware's code and behavior to identify its purpose, vulnerabilities, and potential threats.
Analyze the primary findings and scientific rigor of a research paper, summarizing its conclusions, author details, and study characteristics. Evaluate the study's quality, design, transparency, reproducibility, and potential conflicts of interest, providing ratings and a final grade based on these factors.
Analyze patent documents by extracting key findings, evaluating scientific rigor, and assessing novelty, rigor, and empiricism. Output includes a summary, author information, primary findings, study details, and an evaluation of study quality, researcher interpretation, and paper quality ratings.
Analyze the personality of the main person in the input by identifying them, contemplating their language and responses, and comparing them to human psychology. Provide a 25-word summary and 5-10 detailed bullet points supporting the analysis.
Analyze the presentation by deeply consuming its content, comparing it to the actual message, and identifying instances of self-references, entertainment, and novel ideas. Score the presentation based on its focus on ideas, selflessness, and entertainment, and provide a summary of the analysis.
Evaluate the quality of writing based on novelty, clarity, and prose, providing specific ratings and improvement recommendations for each. Use a step-by-step approach to assess how new, clear, and distinctive the content is, ultimately assigning an overall rating that reflects the lowest individual score.
Analyze prose text by identifying its key elements, such as themes, tone, and structure, and convert this analysis into a structured JSON format for easier manipulation and interpretation. Ensure the output is clear, organized, and machine-readable to support further data processing or visualization tasks.
Analyze prose from Pinker's book, focusing on key arguments and literary style. Extract and summarize the main points in a clear and concise manner.
Analyze resume keywords and phrases to optimize them for a specific job role and industry by identifying key qualifications, researching industry-specific keywords, and suggesting impactful keywords to enhance the resume's alignment with the role and industry. The analysis includes a detailed breakdown of the resume's strengths and gaps, along with the rationale behind the recommended keywords.
Analyze spiritual text by deeply consuming the content, identifying primary themes, and evaluating the speaker's underlying psychology. Output a detailed breakdown of the text's focus on ideas, selflessness, and entertainment, along with a scoring system and bullet points summarizing key instances.
Reflect on your motivations for taking a course and identify specific learning goals to enhance personal growth. Evaluate the course’s structure, content, and teaching methods to ensure alignment with your educational needs and preferences.
Analyze the societal impact of technology projects by summarizing objectives, technologies used, target audience, outcomes, societal impacts, ethical considerations, and sustainability, concluding with a summary rating of societal benefit and sustainability. Output the analysis in structured Markdown without formatting.
Analyze threat reports to identify potential security risks and vulnerabilities. Provide a detailed summary of the findings and recommendations for mitigation.
Analyze threat report trends to identify emerging cybersecurity threats and understand their impact on global security. The prompt aims to provide insights into the evolving landscape of cyber threats and potential mitigation strategies.
Interpret questions deeply and answer insightfully in concise Markdown bullet points, focusing on clarity and brevity. Create mental models to fully understand and respond to queries effectively.
Analyze the design of secure systems to identify potential vulnerabilities and suggest improvements. Evaluate the effectiveness of various security measures in preventing common attacks.
Analyze the top 20 pain points of a target audience and generate 5 actionable problem-solving content ideas for each pain point, ensuring the ideas are specific, practical, and directly address the identified issues.
The prompt aims to capture the essence of thinkers' work by analyzing their writings and identifying key concepts, themes, and ideas. It seeks to understand the underlying thoughts and contributions of influential thinkers across various fields.
Analyze contracts and agreements to identify gotchas and summarize the content in Markdown format. The output includes a document summary, callouts, and responses to critical and important issues.