![]() |
Cyber Security: Public/Private Keys
OPENING QUESTIONS: Yesterday was a wee bit ragged. I worked to make a power point presentation HERE If you don't have Power point, HERE is a pdf version. I tried an .mp4 version and that is HERE OBJECTIVES:
WORDS FOR TODAY:
WORK FOR TODAY: Since we have a short day today, I'll walk through the power point with you. When we are done I want you to work with chatGPT to have a conversation about how that process works. It is REALLY important that you don't treat GPT as a search engine. GPT works best when you treat it as a knowledge base. Ask it specific questions and *require* that it give you straightforward questions. GPT will often send a blast of text back at you. Don't let it do that, tell it in advance that you are going to ask a question and that you want a single sentence response. Imagine that you are talking to a really, really knowledgeable 6th grader that tends to show off sometimes. You have to keep reminding that 6th grader that you want basic responses. You have to learn how to interact with GPT in a way that is far removed from telling it to do whatever it is that you're working on. That is a lousy way to learn. Instead try something like this:
"I'm a high school sophomore learning about asymmetric and symmetric encryption. I need to ask you specific questions about that and I need you to respond in single sentence responses. If I need more information I will respond with specific questions of my own" IT WORKS!!!!
|