chore: update roadmap content json (#6768)

Co-authored-by: kamranahmedse <kamranahmedse@users.noreply.github.com>
pull/6769/head
github-actions[bot] 2 months ago committed by GitHub
parent 6563ca95e7
commit 96ee0f8c3e
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 40
      public/roadmap-content/android.json
  2. 57
      public/roadmap-content/angular.json
  3. 4
      public/roadmap-content/api-design.json
  4. 82
      public/roadmap-content/cyber-security.json
  5. 124
      public/roadmap-content/data-analyst.json
  6. 39
      public/roadmap-content/frontend.json
  7. 50
      public/roadmap-content/game-developer.json
  8. 16
      public/roadmap-content/git-github.json
  9. 14
      public/roadmap-content/javascript.json
  10. 5
      public/roadmap-content/nodejs.json
  11. 37
      public/roadmap-content/react.json
  12. 2
      public/roadmap-content/software-architect.json
  13. 22
      public/roadmap-content/sql.json

@ -237,8 +237,14 @@
},
"boMz0HZlMAsLdCZlpUo-H": {
"title": "EditText",
"description": "",
"links": []
"description": "`EditText` is a fundamental UI element in Android Studio, used for allowing users to input and edit text within an application. It is a subclass of `TextView` that provides additional features to handle user input.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: EditText",
"url": "https://developer.android.com/reference/android/widget/EditText",
"type": "article"
}
]
},
"Mtx0bY0drmaTw8sCM5YTl": {
"title": "Dialogs",
@ -275,13 +281,25 @@
},
"A4rtNULX_MoV93IH1Lgqw": {
"title": "ImageView",
"description": "",
"links": []
"description": "Displays image resources, for example Bitmap or Drawable resources. ImageView is also commonly used to apply tints to an image and handle image scaling.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: ImageView",
"url": "https://developer.android.com/reference/android/widget/ImageView",
"type": "article"
}
]
},
"Z4Tbd5ClnqCXGPGG09F-G": {
"title": "Bottom Sheet",
"description": "",
"links": []
"description": "`Bottom sheets` are surfaces containing supplementary content that are anchored to the bottom of the screen.\n\nThere are several attributes that can be used to adjust the behavior of both standard and modal bottom sheets. Behavior attributes can be applied to standard bottom sheets in xml by setting them on a child View set to `app:layout_behavior` or programmatically.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: Bottom sheets",
"url": "https://developer.android.com/reference/com/google/android/material/bottomsheet/BottomSheetDialog",
"type": "article"
}
]
},
"EzLjX4iRT7AxkAOsJYnSU": {
"title": "ListView",
@ -295,8 +313,14 @@
},
"pEBpXv3Jf1AzBNHlvVrG8": {
"title": "Tabs",
"description": "",
"links": []
"description": "Tabs in Android Studio are a UI component used to organize content into multiple sections, allowing users to navigate between them by selecting the corresponding tab. This component is commonly used when there is a need to present different types of content in a single screen, like different categories, settings, or pages within an app.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Android developers: Material Tabs",
"url": "https://developer.android.com/reference/com/google/android/material/tabs/package-summary",
"type": "article"
}
]
},
"Xn1VQ-xOT67ZfJJTM4r1p": {
"title": "Animations",

@ -5,7 +5,7 @@
"links": [
{
"title": " Angular website",
"url": "https://angularjs.org/",
"url": "https://angular.dev/",
"type": "article"
}
]
@ -400,8 +400,24 @@
},
"w_BazXvINFyxDCHmlznfy": {
"title": "Feature Modules",
"description": "",
"links": []
"description": "Feature modules are `NgModules` for the purpose of organizing code. With feature modules, you can keep code related to a specific functionality or feature separate from other code. Delineating areas of your application helps with collaboration between developers and teams, separating directives, and managing the size of the root module.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Angular Official Docs - Feature Modules",
"url": "https://angular.dev/guide/ngmodules/feature-modules#how-to-make-a-feature-module",
"type": "article"
},
{
"title": "Feature module with lazy loading in Angular 15",
"url": "https://medium.com/@jaydeepvpatil225/feature-module-with-lazy-loading-in-angular-15-53bb8e15d193",
"type": "article"
},
{
"title": "Creating a Feature Module | Understanding Angular Modules",
"url": "https://www.youtube.com/watch?v=VaPhaexVa1U",
"type": "video"
}
]
},
"bLERvEERmNI5AgxtEYokZ": {
"title": "Lazy Loading Modules",
@ -426,8 +442,24 @@
},
"5b590c7s-2XJ0rgdCYxLa": {
"title": "Dependencies",
"description": "",
"links": []
"description": "A provider is an instruction to the Dependency Injection system on how to obtain a value for a dependency. Most of the time, these dependencies are services that you create and provide.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Angular Official Docs - Providing dependencies in modules",
"url": "https://angular.dev/guide/ngmodules/providers",
"type": "article"
},
{
"title": "Providers in Angular",
"url": "https://www.scaler.com/topics/angular/providers-in-angular/",
"type": "article"
},
{
"title": "Working with providers in Angular",
"url": "https://sergeygultyayev.medium.com/working-with-providers-in-angular-eeb493151446",
"type": "article"
}
]
},
"6fhe9xAi_RSVfa-KKbcbV": {
"title": "Templates",
@ -629,8 +661,19 @@
},
"ORdPDad4HWJAfcZuS-7yM": {
"title": "@else",
"description": "",
"links": []
"description": "While the `@if` block can be helpful in many situations, it's common to also show fallback UI when the condition is not met. When you need a fallback, similar to JavaScript's else clause, add an `@else` block to accomplish the same effect.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Angular Official Docs - @else block",
"url": "https://angular.dev/essentials/conditionals-and-loops#else-block",
"type": "article"
},
{
"title": "Angular If Else Control Flow Blocks Explained",
"url": "https://ultimatecourses.com/blog/angular-if-else-control-flow-blocks-explained",
"type": "article"
}
]
},
"ys5untkSppGMFK-VsfuRt": {
"title": "@else if",

@ -798,7 +798,7 @@
"description": "Stoplight is an advanced tool that offers a comprehensive platform for technical teams to handle all aspects of API design. Leveraging Stoplight, teams can design, document and develop APIs in a more collaborative and streamlined manner. It uses an OpenAPI specification and allows users to design APIs visually, making API development easier. With its ability to auto-generate API documentation, performing API mock testing, and providing API management features, Stoplight plays a crucial role in adopting a design-first approach in API development. By using Stoplight, APIs can be designed to be easy-to-use, scalable, and robust from the outset, which ultimately improves the overall development process and quality of the APIs.\n\nLearn more from the following resources:",
"links": [
{
"title": "/stoplightio",
"title": "stoplightio",
"url": "https://github.com/stoplightio",
"type": "opensource"
},
@ -1259,7 +1259,7 @@
"type": "article"
},
{
"title": "@articleWhat is API mocking (What is API Mocking? Definition, Guide, and Best Practices)",
"title": "What is API mocking (What is API Mocking? Definition, Guide, and Best Practices)",
"url": "https://blog.postman.com/what-is-api-mocking/",
"type": "article"
},

@ -1903,8 +1903,19 @@
},
"KSwl6sX2W47vUmytpm8LH": {
"title": "Whaling",
"description": "",
"links": []
"description": "Whaling is a specific type of phishing attack that targets high-profile individuals within an organization, such as executives, CEOs, or other senior leaders. The term \"whaling\" is derived from the idea of hunting large \"whales,\" as opposed to the more common \"phishing,\" which targets a broader range of users. Whaling attacks are highly sophisticated and often involve personalized emails or communications that appear legitimate, making them difficult to detect.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is a Whaling Attack?",
"url": "https://usa.kaspersky.com/resource-center/definitions/what-is-a-whaling-attack",
"type": "article"
},
{
"title": "What is a whaling attack and how to stay protected",
"url": "https://www.youtube.com/watch?v=jQONycdUOAA",
"type": "video"
}
]
},
"d4U6Jq-CUB1nNN2OCFoum": {
"title": "Smishing",
@ -1913,13 +1924,40 @@
},
"cbEMUyg_btIPjdx-XqIM5": {
"title": "Spam vs Spim",
"description": "",
"links": []
"description": "Spam refers to unsolicited and often irrelevant messages sent over email, typically to a large number of recipients, with the purpose of advertising, phishing, spreading malware, or other malicious activities. Spam emails are usually sent by automated bots and are characterized by their bulk nature.\n\nSpim is a type of spam that specifically targets instant messaging (IM) platforms rather than email. Spim messages are unsolicited and typically used for advertising, phishing, or spreading malware. As instant messaging apps have grown in popularity, so too has the prevalence of Spim.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What Is Spam?",
"url": "https://www.proofpoint.com/us/threat-reference/spam",
"type": "article"
}
]
},
"FD0bkmxNpPXiUB_NevEUf": {
"title": "Shoulder Surfing",
"description": "",
"links": []
"description": "In a Shoulder Surfing Attack, an attacker tries to get information when you are unaware of where the attacker looks over your shoulder or from your back to see what you're doing on your device and obtain sensitive information. Shoulder Surfing attacks are accomplished by observing the content \"over the victim's shoulder\". It is a social engineering attack where the attackers physically view the device screen and keypad to obtain personal information. This attack is mostly done when you are in a public place or crowded area. Sometimes attackers attack when you are busy on your device and the attacker could be your friend, someone you know or it may be some stranger.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is Shoulder Surfing",
"url": "https://www.geeksforgeeks.org/what-is-shoulder-surfing-in-cyber-security/",
"type": "article"
},
{
"title": "What is shoulder surfing, and how can you avoid it?",
"url": "https://nordvpn.com/blog/shoulder-surfing/?srsltid=AfmBOorl5NPpW_Tnhas9gB2HiblorqwXyK0NJae7uaketrnDwbjJmiYV",
"type": "article"
},
{
"title": "What is Shoulder Surfing?",
"url": "https://www.mcafee.com/learn/what-is-shoulder-surfing/",
"type": "article"
},
{
"title": "What is Shoulder Surfing? 9 ways to protect yourself",
"url": "https://www.bigrock.in/blog/products/security/what-is-shoulder-surfing-9-ways-to-protect-yourself-from-shoulder-surfing/",
"type": "article"
}
]
},
"Iu0Qtk13RjrhHpSlm0uyh": {
"title": "Dumpster Diving",
@ -1950,8 +1988,14 @@
},
"O1VceThdxRlgQ6DcGyY7Y": {
"title": "Social Engineering",
"description": "",
"links": []
"description": "Social Engineering is a manipulation technique that exploits human psychology to gain access to confidential information, systems, or physical locations. Unlike traditional hacking methods that rely on technical skills, social engineering primarily focuses on deceiving or tricking individuals into revealing sensitive information or performing actions that compromise security.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What Is Social Engineering?",
"url": "https://www.cisco.com/c/en/us/products/security/what-is-social-engineering.html",
"type": "article"
}
]
},
"UU_inxa8Y2lLP2BRhdLDT": {
"title": "Reconnaissance",
@ -1999,13 +2043,25 @@
},
"0LeDwj_tMaXjQBBOUJ5CL": {
"title": "Typo Squatting",
"description": "",
"links": []
"description": "Typosquatting is a form of cyberattack that exploits common typing errors made by users when entering website URLs into their browsers. Attackers create malicious websites with URLs that are very similar to legitimate ones, often differing by just a single letter, number, or symbol. When a user accidentally mistypes a URL, they may be redirected to the malicious site, where they can be subjected to phishing attacks, malware downloads, or other forms of cyber exploitation.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is Typosquatting",
"url": "https://www.mcafee.com/learn/what-is-typosquatting/#:~:text=Typosquatting%2C%20also%20known%20as%20URL,%E2%80%9CGoogle.com%E2%80%9D",
"type": "article"
}
]
},
"Q0i-plPQkb_NIvOQBVaDd": {
"title": "Brute Force vs Password Spray",
"description": "",
"links": []
"description": "What is Brute Force?\n--------------------\n\nBrute Force is a method of password cracking where an attacker systematically tries all possible combinations of characters until the correct password is found. This method is highly resource-intensive, as it involves attempting numerous password variations in a relatively short period of time.\n\nWhat is Password Spray?\n-----------------------\n\nPassword Spray is a more targeted and stealthy method of password cracking where an attacker tries a small number of common passwords across many different accounts. Instead of bombarding a single account with numerous password attempts (as in brute force), password spraying involves using one or a few passwords against multiple accounts.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Brute force vs. Password Spray attack",
"url": "https://www.inspark.nl/brute-force-vs-password-spray-attack-in-azure-sentinel/",
"type": "article"
}
]
},
"IF5H0ZJ72XnqXti3jRWYF": {
"title": "DoS vs DDoS",
@ -2035,7 +2091,7 @@
},
"urtsyYWViEzbqYLoNfQAh": {
"title": "DNS Poisoning",
"description": "",
"description": "DNS spoofing or DNS cache poisoning, occurs when fake information is inserted into a DNS server’s cache.This causes DNS queries to return incorrect IP addresses, directing users to the wrong websites. Hackers exploit this to reroute traffic to malicious sites. The issue persists until the cached information is corrected.When the cache is poisoned, it misdirects traffic until the incorrect information is fixed. This technique exploits vulnerabilities in the DNS system and can spread to other servers, causing widespread issues.\n\nVisit the following resources to learn more:",
"links": []
},
"LfWJJaT3fv0p6fUeS8b84": {

@ -1,7 +1,7 @@
{
"3xp2fogAVmwXQhdzhZDWR": {
"title": "Introduction",
"description": "Data Analysis plays a crucial role in today's data-centric world. It involves the practice of inspecting, cleansing, transforming, and modeling data to extract valuable insights for decision-making. A **Data Analyst** is a professional primarily tasked with collecting, processing, and performing statistical analysis on large datasets. They discover how data can be used to answer questions and solve problems. With the rapid expansion of data in modern firms, the role of a data analyst has been evolving greatly, making them a significant asset in business strategy and decision-making processes.\n\nLearn more from the following resources:",
"description": "Data Analysis plays a crucial role in today's data-centric world. It involves the practice of inspecting, cleansing, transforming, and modeling data to extract valuable insights for decision-making. A **Data Analyst** is a professional primarily tasked with collecting, processing, and performing statistical analysis on large datasets. They discover how data can be used to answer questions and solve problems. With the rapid expansion of data in modern firms, the role of a data analyst has been evolving greatly, making them a significant asset in business strategy and decision-making processes.",
"links": []
},
"yCnn-NfSxIybUQ2iTuUGq": {
@ -183,6 +183,11 @@
"title": "Analaysis / Reporting with Excel",
"description": "Excel is a powerful tool utilized by data analysts worldwide to store, manipulate, and analyze data. It offers a vast array of features such as pivot tables, graphs and a powerful suite of formulas and functions to help sift through large sets of data. A data analyst uses Excel to perform a wide range of tasks, from simple data entry and cleaning, to more complex statistical analysis and predictive modeling. Proficiency in Excel is often a key requirement for a data analyst, as its versatility and ubiquity make it an indispensable tool in the field of data analysis.",
"links": [
{
"title": "Microsoft Excel Course",
"url": "https://support.microsoft.com/en-us/office/excel-video-training-9bc05390-e94c-46af-a5b3-d7c22f6990bb",
"type": "course"
},
{
"title": "W3Schools - Excel",
"url": "https://www.w3schools.com/excel/index.php",
@ -214,6 +219,11 @@
"title": "DATEDIF function",
"url": "https://support.microsoft.com/en-gb/office/datedif-function-25dba1a4-2812-480b-84dd-8b32a451b35c",
"type": "article"
},
{
"title": "How to use DATEDIF in Excel",
"url": "https://www.excel-easy.com/examples/datedif.html",
"type": "article"
}
]
},
@ -403,15 +413,16 @@
}
]
},
"i4VCwFm-wc9cqE73i-BIb": {
"title": "Learn SQL",
"description": "Structured Query Language, or SQL, is an essential tool for every data analyst. As a domain-specific language used in programming and designed for managing data held in relational database management systems, SQL allows analysts to manipulate and analyse large volumes of data efficiently. Understanding SQL allows a data analyst to extract insights from data stored in databases, conduct complex queries, and create elaborate data reports. SQL is recognized for its effectiveness in data manipulation and its compatibility with other coding languages, making it a fundamental competency in the data analytics field.",
"links": []
},
"i2uEcaO4bJhcZ5ayRs2CQ": {
"title": "Learn a Programming Lang.",
"description": "We have two main programming languages when it comes to data analysis: Python and R. Both have extensive libraries to help with decision-making processes in various situations, assisting in manipulating, modeling, and visualizing data. Python is a versatile language, used not only for data analysis but also for web development, automation, artificial intelligence, and more. R, on the other hand, was specifically created for statistical analysis and data visualization, making it an excellent choice for statisticians and researchers. It is known for its advanced visualization capabilities, allowing the creation of highly customizable and sophisticated graphs and plots.\n\nWith potential doubts about which language to choose to advance in a data career, it is ideal to consider your goals and/or the current market needs and choose which language to learn. If you are more interested in a career that combines data analysis with software development, automation, or artificial intelligence, Python may be the best choice. If your focus is purely on statistics and data visualization, R might be more suitable.",
"links": []
"description": "We have two main programming languages when it comes to data analysis: Python and R. Both have extensive libraries to help with decision-making processes in various situations, assisting in manipulating, modeling, and visualizing data. Python is a versatile language, used not only for data analysis but also for web development, automation, artificial intelligence, and more. R, on the other hand, was specifically created for statistical analysis and data visualization, making it an excellent choice for statisticians and researchers. It is known for its advanced visualization capabilities, allowing the creation of highly customizable and sophisticated graphs and plots.\n\nWith potential doubts about which language to choose to advance in a data career, it is ideal to consider your goals and/or the current market needs and choose which language to learn. If you are more interested in a career that combines data analysis with software development, automation, or artificial intelligence, Python may be the best choice. If your focus is purely on statistics and data visualization, R might be more suitable.\n\nLearn more from the following resources:",
"links": [
{
"title": "Python Data Science Handbook",
"url": "https://jakevdp.github.io/PythonDataScienceHandbook/",
"type": "article"
}
]
},
"g_EBQizZsIe-vn8ir6FTv": {
"title": "R",
@ -491,6 +502,11 @@
"title": "Ggplot2",
"description": "When it comes to data visualization in R programming, ggplot2 stands tall as one of the primary tools for data analysts. This data visualization library, which forms part of the tidyverse suite of packages, facilitates the creation of complex and sophisticated visual narratives. With its grammar of graphics philosophy, ggplot2 enables analysts to build graphs and charts layer by layer, thereby offering detailed control over graphical features and design. Its versatility in creating tailored and aesthetically pleasing graphics is a vital asset for any data analyst tackling exploratory data analysis, reporting, or dashboard building.\n\nLearn more from the following resources:",
"links": [
{
"title": "ggplot2 website",
"url": "https://ggplot2.tidyverse.org/",
"type": "article"
},
{
"title": "Make beautiful graphs in R",
"url": "https://www.youtube.com/watch?v=qnw1xDnt_Ec",
@ -619,6 +635,11 @@
"title": "Data Transformation",
"description": "Data Transformation, also known as Data Wrangling, is an essential part of a Data Analyst's role. This process involves the conversion of data from a raw format into another format to make it more appropriate and valuable for a variety of downstream purposes such as analytics. Data Analysts transform data to make the data more suitable for analysis, ensure accuracy, and to improve data quality. The right transformation techniques can give the data a structure, multiply its value, and enhance the accuracy of the analytics performed by serving meaningful results.",
"links": [
{
"title": "What is data transformation?",
"url": "https://www.qlik.com/us/data-management/data-transformation",
"type": "article"
},
{
"title": "Explore top posts about Data Analysis",
"url": "https://app.daily.dev/tags/data-analysis?ref=roadmapsh",
@ -679,9 +700,14 @@
"description": "Dispersion in descriptive analysis, specifically for a data analyst, offers a crucial way to understand the variability or spread in a set of data. Descriptive analysis focus on describing and summarizing data to find patterns, relationships, or trends. Distinct measures of dispersion such as range, variance, standard deviation, and interquartile range gives data analysts insight into how spread out data points are, and how reliable any patterns detected may be. This understanding of dispersion helps data analysts in identifying outliers, drawing meaningful conclusions, and making informed predictions.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Standard Deviation and Variance",
"url": "https://www.mathsisfun.com/data/standard-deviation.html",
"title": "What is dispersion?",
"url": "https://www.investopedia.com/terms/d/dispersion.asp",
"type": "article"
},
{
"title": "Statistics 101 - Measures of Dispersion",
"url": "https://www.youtube.com/watch?v=goXdWMZxlqM",
"type": "video"
}
]
},
@ -751,8 +777,19 @@
},
"yn1sstYMO9du3rpfQqNs9": {
"title": "Average",
"description": "When focusing on data analysis, understanding key statistical concepts is crucial. Amongst these, central tendency is a foundational element. Central Tendency refers to the measure that determines the center of a distribution. The average is a commonly used statistical tool by which data analysts discern trends and patterns. As one of the most recognized forms of central tendency, figuring out the \"average\" involves summing all values in a data set and dividing by the number of values. This provides analysts with a 'typical' value, around which the remaining data tends to cluster, facilitating better decision-making based on existing data.",
"links": []
"description": "When focusing on data analysis, understanding key statistical concepts is crucial. Amongst these, central tendency is a foundational element. Central Tendency refers to the measure that determines the center of a distribution. The average is a commonly used statistical tool by which data analysts discern trends and patterns. As one of the most recognized forms of central tendency, figuring out the \"average\" involves summing all values in a data set and dividing by the number of values. This provides analysts with a 'typical' value, around which the remaining data tends to cluster, facilitating better decision-making based on existing data.\n\nLearn more from the following resources:",
"links": [
{
"title": "How to calculate the average",
"url": "https://support.microsoft.com/en-gb/office/calculate-the-average-of-a-group-of-numbers-e158ef61-421c-4839-8290-34d7b1e68283#:~:text=Average%20This%20is%20the%20arithmetic,by%206%2C%20which%20is%205.",
"type": "article"
},
{
"title": "Average Formula",
"url": "https://www.cuemath.com/average-formula/",
"type": "article"
}
]
},
"tSxtyJhL5wjU0XJcjsJmm": {
"title": "Range",
@ -770,12 +807,12 @@
"description": "Data analysts heavily rely on statistical concepts to analyze and interpret data, and one such fundamental concept is variance. Variance, an essential measure of dispersion, quantifies the spread of data, providing insight into the level of variability within the dataset. Understanding variance is crucial for data analysts as the reliability of many statistical models depends on the assumption of constant variance across observations. In other words, it helps analysts determine how much data points diverge from the expected value or mean, which can be pivotal in identifying outliers, understanding data distribution, and driving decision-making processes. However, variance can't be interpreted in the original units of measurement due to its squared nature, which is why it is often used in conjunction with its square root, the standard deviation.\n\nLearn more from the following resources:",
"links": [
{
"title": "",
"title": "What is variance?",
"url": "https://www.investopedia.com/terms/v/variance.asp",
"type": "article"
},
{
"title": "https://www.scribbr.co.uk/stats/variance-meaning/",
"title": "How to calculate variance",
"url": "https://www.scribbr.co.uk/stats/variance-meaning/",
"type": "article"
}
@ -816,6 +853,11 @@
"title": "Kurtosis: Definition, Types, and Importance",
"url": "https://www.investopedia.com/terms/k/kurtosis.asp",
"type": "article"
},
{
"title": "What is Kurtosis?",
"url": "https://www.youtube.com/watch?v=AsxEDBhESJg",
"type": "video"
}
]
},
@ -869,8 +911,19 @@
},
"tvDdXwaRPsUSTqJGaLS3P": {
"title": "Matplotlib",
"description": "For a Data Analyst, understanding data and being able to represent it in a visually insightful form is a crucial part of effective decision-making in any organization. Matplotlib, a plotting library for the Python programming language, is an extremely useful tool for this purpose. It presents a versatile framework for generating line plots, scatter plots, histogram, bar charts and much more in a very straightforward manner. This library also allows for comprehensive customizations, offering a high level of control over the look and feel of the graphics it produces, which ultimately enhances the quality of data interpretation and communication.",
"links": []
"description": "For a Data Analyst, understanding data and being able to represent it in a visually insightful form is a crucial part of effective decision-making in any organization. Matplotlib, a plotting library for the Python programming language, is an extremely useful tool for this purpose. It presents a versatile framework for generating line plots, scatter plots, histogram, bar charts and much more in a very straightforward manner. This library also allows for comprehensive customizations, offering a high level of control over the look and feel of the graphics it produces, which ultimately enhances the quality of data interpretation and communication.\n\nLearn more from the following resources:",
"links": [
{
"title": "Matplotlib Website",
"url": "https://matplotlib.org/",
"type": "article"
},
{
"title": "Learn Matplotlib in 6 minutes",
"url": "https://www.youtube.com/watch?v=nzKy9GY12yo",
"type": "video"
}
]
},
"-cJb8gEBvdVFf7FlgG3Ud": {
"title": "Seaborn",
@ -890,8 +943,19 @@
},
"n3M49lgNPn28hm7kzki-a": {
"title": "ggplot2",
"description": "ggplot2 is an important and powerful tool in the data analyst's toolkit, especially for visualizing and understanding complex datasets. Built within the R programming language, it provides a flexible, cohesive environment for creating graphs. The main strength of ggplot2 lies in its ability to produce sophisticated and tailored visualizations. This allows data analysts to communicate data-driven findings in an efficient and effective manner, enabling clear communication to stakeholders about relevant insights and patterns identified within the data.",
"links": []
"description": "ggplot2 is an important and powerful tool in the data analyst's toolkit, especially for visualizing and understanding complex datasets. Built within the R programming language, it provides a flexible, cohesive environment for creating graphs. The main strength of ggplot2 lies in its ability to produce sophisticated and tailored visualizations. This allows data analysts to communicate data-driven findings in an efficient and effective manner, enabling clear communication to stakeholders about relevant insights and patterns identified within the data.\n\nLearn more from the following resources:",
"links": [
{
"title": "ggplot2 website",
"url": "https://ggplot2.tidyverse.org/",
"type": "article"
},
{
"title": "Make beautiful graphs in R",
"url": "https://www.youtube.com/watch?v=qnw1xDnt_Ec",
"type": "video"
}
]
},
"EVk1H-QLtTlpG7lVEenDt": {
"title": "Bar Charts",
@ -1055,6 +1119,11 @@
"title": "Correlation",
"url": "https://www.mathsisfun.com/data/correlation.html",
"type": "article"
},
{
"title": "What is correlation analysis?",
"url": "https://blog.flexmr.net/correlation-analysis-definition-exploration",
"type": "article"
}
]
},
@ -1233,8 +1302,8 @@
"description": "K-Nearest Neighbors (KNN) is a simple yet powerful algorithm used in the field of machine learning, which a Data Analyst might employ for tasks such as classification or regression. It works based on the principle of proximity, where the prediction of new instance's category depends upon the category of its nearest neighbors. For a Data Analyst working with complex data sets, it's crucial to understand how the KNN algorithm operates, its applicability, pros, and cons. This will facilitate making well-informed decisions about when to utilize it for the best possible outcome in data analysis.\n\nLearn more from the following resources:",
"links": [
{
"title": "https://www.ibm.com/topics/knn#:~:text=The k-nearest neighbors (KNN,used in machine learning today.)",
"url": "https://www.ibm.com/topics/knn#:~:text=The%20k%2Dnearest%20neighbors%20(KNN,used%20in%20machine%20learning%20today.)",
"title": "What is the k-nearest neighbors (KNN) algorithm?",
"url": "https://www.ibm.com/topics/knn#:~:text=The%20k%2Dnearest%20neighbors%20KNN,used%20in%20machine%20learning%20today.",
"type": "article"
},
{
@ -1459,7 +1528,18 @@
},
"iTmtpXe7dR4XKslgpsk2q": {
"title": "Data Storage Solutions",
"description": "As a business enterprise expands, so does its data. For data analysts, the surge in information means they need efficient and scalable data storage solutions to manage vast volumes of structured and unstructured data, collectively referred to as Big Data. Big Data storage solutions are critical in preserving the integrity of data while also providing quick and easy access to the data when needed. These solutions use software and hardware components to securely store massive amounts of information across numerous servers, allowing data analysts to perform robust data extraction, data processing and complex data analyses. There are several options, from the traditional Relational Database Management Systems (RDBMS) to the more recent NoSQL databases, Hadoop ecosystems, and Cloud storage solutions, each offering unique capabilities and benefits to cater for different big data needs.",
"links": []
"description": "As a business enterprise expands, so does its data. For data analysts, the surge in information means they need efficient and scalable data storage solutions to manage vast volumes of structured and unstructured data, collectively referred to as Big Data. Big Data storage solutions are critical in preserving the integrity of data while also providing quick and easy access to the data when needed. These solutions use software and hardware components to securely store massive amounts of information across numerous servers, allowing data analysts to perform robust data extraction, data processing and complex data analyses. There are several options, from the traditional Relational Database Management Systems (RDBMS) to the more recent NoSQL databases, Hadoop ecosystems, and Cloud storage solutions, each offering unique capabilities and benefits to cater for different big data needs.\n\nLearn more from the following resources:",
"links": [
{
"title": "SQL Roadmap",
"url": "https://roadmap.sh/sql",
"type": "article"
},
{
"title": "PostgreSQL Roadmap",
"url": "https://roadmap.sh/postgresql-dba",
"type": "article"
}
]
}
}

@ -595,7 +595,7 @@
"links": [
{
"title": "Learn CSS Grid for free",
"url": "https://scrimba.com/learn/cssgrid",
"url": "https://scrimba.com/learn/cssgrid?via=roadmap",
"type": "course"
},
{
@ -2088,7 +2088,7 @@
"links": [
{
"title": "Scrimba — TypeScript Basics",
"url": "https://scrimba.com/learn/typescript",
"url": "https://scrimba.com/learn/typescript?via=roadmap",
"type": "course"
},
{
@ -3111,8 +3111,39 @@
},
"h26uS3muFCabe6ekElZcI": {
"title": "SWC",
"description": "",
"links": []
"description": "**SWC** (Speedy Web Compiler) is a JavaScript and TypeScript compiler and bundler built in Rust. Unlike Babel, which is JavaScript-based, SWC leverages Rust for blazing-fast performance, making it an ideal choice for large-scale projects. It focuses on speed while offering modern features like tree shaking, JSX transformation, and module bundling, catering to frontend development and build optimization.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "SWC Website",
"url": "https://swc.rs/",
"type": "article"
},
{
"title": "SWC Documentation",
"url": "https://swc.rs/docs/",
"type": "article"
},
{
"title": "SWC vs Babel: A Rust-Powered Speed Revolution",
"url": "https://blog.logrocket.com/swc-vs-babel/",
"type": "article"
},
{
"title": "Why SWC is the Future of JavaScript Tooling",
"url": "https://dev.to/somelink/why-swc-is-the-future-of-javascript-tooling",
"type": "article"
},
{
"title": "Explore top posts about SWC",
"url": "https://app.daily.dev/tags/swc?ref=roadmapsh",
"type": "article"
},
{
"title": "Introduction to SWC",
"url": "https://www.youtube.com/watch?v=wlmbNWC3yB8",
"type": "video"
}
]
},
"wA2fSYsbBYU02VJXAvUz8": {
"title": "Astro",

@ -400,8 +400,14 @@
},
"lIb5MeDoqVj6HycveOgTS": {
"title": "Computer Graphics",
"description": "Computer Graphics is a subfield of computer science that studies methods for digitally synthesizing and manipulating visual content. It involves creating and manipulating visual content using specialized computer software and hardware. This field is primarily used in the creation of digital and video games, CGI in films, and also in visual effects for commercials. The field is divided into two major categories: **Raster graphics** and **Vector graphics**. Raster graphics, also known as bitmap, involve the representation of images through a dot matrix data structure, while Vector graphics involve the use of polygons to represent images in computer graphics. Both of these methods have their unique usage scenarios. Other concepts integral to the study of computer graphics include rendering (including both real-time rendering and offline rendering), animation, and 3D modeling. Generally, computer graphics skills are essential for game developers and animation experts.",
"links": []
"description": "Computer Graphics is a subfield of computer science that studies methods for digitally synthesizing and manipulating visual content. It involves creating and manipulating visual content using specialized computer software and hardware. This field is primarily used in the creation of digital and video games, CGI in films, and also in visual effects for commercials. The field is divided into two major categories: **Raster graphics** and **Vector graphics**. Raster graphics, also known as bitmap, involve the representation of images through a dot matrix data structure, while Vector graphics involve the use of polygons to represent images in computer graphics. Both of these methods have their unique usage scenarios. Other concepts integral to the study of computer graphics include rendering (including both real-time rendering and offline rendering), animation, and 3D modeling. Generally, computer graphics skills are essential for game developers and animation experts.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "How do Video Game Graphics Work?",
"url": "https://www.youtube.com/watch?v=C8YtdC8mxTU",
"type": "video"
}
]
},
"JW5c_0JEtO-OiBoXUia6A": {
"title": "Ray Tracing",
@ -430,8 +436,14 @@
},
"WVgozaQPFbYthZLWMbNUg": {
"title": "Rendering Equation",
"description": "The **Render Equation**, also known as the **Rendering Equation**, is a fundamental principle in computer graphics that serves as the basis for most advanced lighting algorithms today. First introduced by James Kajiya in 1986, it defines how light interacts with physical objects in a given environment. The equation tries to simulate light's behavior, taking into account aspects such as transmission, absorption, scattering, and emission. The equation can be computationally intensive to solve accurately. It's worth mentioning, however, that many methods have been developed to approximate and solve it, allowing the production of highly realistic images in computer graphics.",
"links": []
"description": "The **Render Equation**, also known as the **Rendering Equation**, is a fundamental principle in computer graphics that serves as the basis for most advanced lighting algorithms today. First introduced by James Kajiya in 1986, it defines how light interacts with physical objects in a given environment. The equation tries to simulate light's behavior, taking into account aspects such as transmission, absorption, scattering, and emission. The equation can be computationally intensive to solve accurately. It's worth mentioning, however, that many methods have been developed to approximate and solve it, allowing the production of highly realistic images in computer graphics.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Interactive Graphics 12 - The Rendering Equation",
"url": "https://www.youtube.com/watch?v=wawf7Am6xy0",
"type": "video"
}
]
},
"eI2jym4AAz3ani-lreSKE": {
"title": "Reflection",
@ -480,8 +492,14 @@
},
"WK6fLWJq9Vh2ySVrSqd-U": {
"title": "Color",
"description": "In the realm of computer graphics, color plays an integral role. It can be defined in various color models such as RGB (Red, Green, Blue), CYMK (Cyan, Yellow, Magenta, Black), and others. RGB is a color model that combines the primary colors (red, green, blue) in different amounts to produce a spectrum of colors. This model is often used in digital displays. In contrast, CMYK is a color model used in color printing. It uses cyan, magyenta, yellow, and black as the primary colors. HSL (Hue, Saturation, Lightness) and HSV (Hue, Saturation, Value) are other useful models that represent colors based on human perceptions. Another important element of color in computer graphics is the color depth, also known as bit depth, which determines the number of colors that can be displayed at once.",
"links": []
"description": "In the realm of computer graphics, color plays an integral role. It can be defined in various color models such as RGB (Red, Green, Blue), CYMK (Cyan, Yellow, Magenta, Black), and others. RGB is a color model that combines the primary colors (red, green, blue) in different amounts to produce a spectrum of colors. This model is often used in digital displays. In contrast, CMYK is a color model used in color printing. It uses cyan, magyenta, yellow, and black as the primary colors. HSL (Hue, Saturation, Lightness) and HSV (Hue, Saturation, Value) are other useful models that represent colors based on human perceptions. Another important element of color in computer graphics is the color depth, also known as bit depth, which determines the number of colors that can be displayed at once.\n\nLearn more from the following resources:",
"links": [
{
"title": "Pixar in a Box - Color",
"url": "https://www.khanacademy.org/computing/pixar/animate/ball/v/intro-animation",
"type": "video"
}
]
},
"1S1qPogijW2SQCiF7KLZe": {
"title": "Visual Perception",
@ -688,8 +706,14 @@
},
"ztoW8fBY73Es624A_tjd7": {
"title": "Behavior Tree",
"description": "The **Behavior Tree** is a decision-making system used in game development, primarily for AI character behavior. These trees help define the actions an AI character will take, based on predefined tasks and conditions. The tree structure starts from a single root, branching out to nodes that represent these decisions or tasks. The tasks can be simple, such as moving from one point to another, or can be complex decisions like whether to attack or retreat. This kind of structure is advantageous because it is easy to add, remove, or modify tasks without breaking the tree or affecting other tasks. This makes it highly flexible and easy to manage, irrespective of the complexity of the tasks.",
"links": []
"description": "The **Behavior Tree** is a decision-making system used in game development, primarily for AI character behavior. These trees help define the actions an AI character will take, based on predefined tasks and conditions. The tree structure starts from a single root, branching out to nodes that represent these decisions or tasks. The tasks can be simple, such as moving from one point to another, or can be complex decisions like whether to attack or retreat. This kind of structure is advantageous because it is easy to add, remove, or modify tasks without breaking the tree or affecting other tasks. This makes it highly flexible and easy to manage, irrespective of the complexity of the tasks.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Unreal Engine 5 Tutorial - AI Part 2: Behavior Tree",
"url": "https://www.youtube.com/watch?v=hbHqv9ov8IM&list=PL4G2bSPE_8uklDwraUCMKHRk2ZiW29R6e&index=3&t=16s",
"type": "video"
}
]
},
"4ZCVUpYrCT14d_JULulLe": {
"title": "Fuzzy Logic",
@ -809,8 +833,14 @@
},
"PuhXaRZ-Ql5PCqzMyz3en": {
"title": "Translucency & Transparency",
"description": "In the realm of physically-based rendering, **translucency** and **transparency** act as key aspects in creating visually authentic and compelling images. Transparency refers to the property of an object that allows light to pass through it unhindered, hence making the object clear or invisible. This is commonly seen in materials such as glass, clear plastic, and water. On the other hand, translucency describes how light interacts with a semi-transparent object. Instead of passing directly through, light enters the object, travels within for some distance and then exits at a different location. Common examples of such surfaces include human skin, marble, milk, or wax, which exhibit a soft, diffused lighting effect when light rays pass through them. The technique to achieve this effect in graphics involves subsurface scattering, where incoming light is scattered beneath the object's surface, illuminated it in a way that showcases the material's internal structure.",
"links": []
"description": "In the realm of physically-based rendering, **translucency** and **transparency** act as key aspects in creating visually authentic and compelling images. Transparency refers to the property of an object that allows light to pass through it unhindered, hence making the object clear or invisible. This is commonly seen in materials such as glass, clear plastic, and water. On the other hand, translucency describes how light interacts with a semi-transparent object. Instead of passing directly through, light enters the object, travels within for some distance and then exits at a different location. Common examples of such surfaces include human skin, marble, milk, or wax, which exhibit a soft, diffused lighting effect when light rays pass through them. The technique to achieve this effect in graphics involves subsurface scattering, where incoming light is scattered beneath the object's surface, illuminated it in a way that showcases the material's internal structure.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Learn OpenGL - Blending",
"url": "https://learnopengl.com/Advanced-OpenGL/Blending",
"type": "article"
}
]
},
"H3hkafXO9zqEnWuwHa38P": {
"title": "Conservation of Energy",

@ -100,7 +100,7 @@
"links": [
{
"title": "About repositories",
"url": "hhttps://docs.github.com/en/repositories/creating-and-managing-repositories/about-repositories",
"url": "https://docs.github.com/en/repositories/creating-and-managing-repositories/about-repositories",
"type": "article"
},
{
@ -1266,7 +1266,7 @@
"links": [
{
"title": "--soft documentation",
"url": "https://git-scm.com/docs/git-reset#Documentation/git-reset.txt---hard",
"url": "https://git-scm.com/docs/git-reset#Documentation/git-reset.txt---soft",
"type": "article"
}
]
@ -1288,7 +1288,7 @@
"links": [
{
"title": "--mixed documentation",
"url": "https://git-scm.com/docs/git-reset#Documentation/git-reset.txt---hard",
"url": "https://git-scm.com/docs/git-reset#Documentation/git-reset.txt---mixed",
"type": "article"
}
]
@ -1416,8 +1416,14 @@
},
"BKVA6Q7DXemAYjyQOA0nh": {
"title": "git filter-branch",
"description": "You can use `git filter-branch` to rewrite Git revision history by applying custom filters on each revision.",
"links": []
"description": "You can use `git filter-branch` to rewrite Git revision history by applying custom filters on each revision.\n\n* Filter types: You can modify trees (e.g., removing a file or running a Perl script) or information about each commit.\n* Preserving original data: The command preserves all original commit times, merge information, and other details unless specified otherwise.\n* Rewriting specific branches: Only the positive refs mentioned in the command line are rewritten; if no filters are specified, commits are recommitted without changes.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "git filter-branch",
"url": "https://git-scm.com/docs/git-filter-branch",
"type": "article"
}
]
},
"OQOmxg9mCfcjt80hpvXkA": {
"title": "git push --force",

@ -360,7 +360,7 @@
},
"oC4o6GLEES_nUgCJu9Q6I": {
"title": "Global",
"description": "Variables declared Globally (outside any function) have Global Scope. Global variables can be accessed from anywhere in a JavaScript program. Variables declared with `var`, `let` and `const` are quite similar when declared outside a block.\n\nVisit the following resources to learn more:",
"description": "Variables declared Globally (outside any function) have Global Scope. Global variables can be accessed from anywhere in a JavaScript program. Variables declared with `var`, `let` and `const` are quite similar when declared outside a block.\n\n### Note:\n\nIf you assign a value to a variable that has not been declared i.e `potato = true` it will automatically become a _GLOBAL_ variable.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "JavaScript Scope",
@ -423,7 +423,7 @@
},
"1RcwBHU3jzx0YxxUGZic4": {
"title": "string",
"description": "String is a primitive type that holds a sequence of characters. String in Javascript is written within a pair of single quotation marks `''` or double quotation marks `\"\"`. Both quotes can be used to contain a string but only if the starting quote is the same as the end quote.\n\nVisit the following resources to learn more:",
"description": "String is a primitive type that holds a sequence of characters. String in Javascript is written within a pair of single quotation marks `''`, double quotation marks `\"\"`, or backticks ` `` ` (template literals). All types of quotes can be used to contain a string but only if the starting quote is the same as the end quote.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "String",
@ -1779,8 +1779,14 @@
},
"gsyY3Oa3Jf0W5K_lyqBYO": {
"title": "call",
"description": "",
"links": []
"description": "The `call()` method allows you to invoke a function with a given `this` value, and arguments provided individually.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "Understanding Explicit Binding in JavaScript: Call, Bind, and Apply Methods",
"url": "https://medium.com/@amitsharma_24072/understanding-explicit-binding-in-javascript-call-bind-and-apply-methods-7b6ed0107628",
"type": "article"
}
]
},
"-BtF34cEzI6J8sZCDRlRE": {
"title": "apply",

@ -1942,6 +1942,11 @@
"title": "Child Process Docs",
"url": "https://nodejs.org/api/child_process.html#child-process",
"type": "article"
},
{
"title": "Securing Node.js Against Command Injection",
"url": "https://www.nodejs-security.com/blog/securing-your-nodejs-apps-by-analyzing-real-world-command-injection-examples",
"type": "article"
}
]
},

@ -675,8 +675,23 @@
},
"mkyU0ug8MXxV4biHuOity": {
"title": "Hooks Best Practices",
"description": "Learn the best practices for using React hooks from the following resources:",
"description": "To fully leverage the capabilities of React Hooks, it is crucial to adopt best practices that not only enhance code readability but also optimize performance. By adhering to these practices, developers can create cleaner, more maintainable components that make the most of React's powerful features, leading to a more efficient and enjoyable development experience.\n\nLearn more from the following resources:",
"links": [
{
"title": "Rules of Hooks",
"url": "https://react.dev/reference/rules/rules-of-hooks/",
"type": "article"
},
{
"title": "React Hooks Best Practices: Unlocking Efficiency and Elegance",
"url": "https://medium.com/womenintechnology/react-hooks-best-practices-unlocking-efficiency-and-elegance-da23f7e1418a",
"type": "article"
},
{
"title": "Mastering React Hooks: Best Practices and Common Pitfalls",
"url": "https://dev.to/codesensei/mastering-react-hooks-best-practices-and-common-pitfalls-3d9i",
"type": "article"
},
{
"title": "React Hooks Cheat Sheet: Best Practices with Examples",
"url": "https://blog.logrocket.com/react-hooks-cheat-sheet-solutions-common-problems/",
@ -1671,8 +1686,24 @@
},
"y2dI1DVLWKAkv6VRpgaQa": {
"title": "GSock",
"description": "",
"links": []
"description": "`GSAP` (GreenSock Animation Platform) is a framework-agnostic JavaScript animation library that turns developers into animation superheroes. Build high-performance animations that work in every major browser. Animate CSS, SVG, canvas, React, Vue, WebGL, colors, strings, motion paths, generic objects...anything JavaScript can touch!\n\nVisit the following resources to learn more:",
"links": [
{
"title": "GSAP: Homepage",
"url": "https://gsap.com/docs/v3/",
"type": "article"
},
{
"title": "The Beginner's Guide to the GreenSock Animation Platform",
"url": "https://www.freecodecamp.org/news/the-beginners-guide-to-the-greensock-animation-platform-7dc9fd9eb826/",
"type": "article"
},
{
"title": "Intro to Greensock Web Animation",
"url": "https://www.youtube.com/watch?v=EOa7ccPWvXg",
"type": "video"
}
]
},
"_F3WMxhzaK9F8_-zHDDMF": {
"title": "Suspense",

@ -317,7 +317,7 @@
},
{
"title": "Scrimba — TypeScript Basics",
"url": "https://scrimba.com/learn/typescript",
"url": "https://scrimba.com/learn/typescript?via=roadmap",
"type": "article"
},
{

@ -179,7 +179,7 @@
},
"YzJ6QmY2arMfRzMAPaI0T": {
"title": "Drop Table",
"description": "The `DROP TABLE` statement is a Data Definition Language (DDL) operation that is used to completely remove a table from the database. This operation deletes the table structure along with all the data in it, effectively removing the table from the database system.\n\nWhen you execute the `DROP TABLE` statement, it eliminates both the table and its data, as well as any associated indexes, constraints, and triggers. Unlike the `TRUNCATE TABLE` statement, which only removes data but keeps the table structure, `DROP TABLE` removes everything associated with the table.\n\nLearn more from the following resources:",
"description": "The `DROP TABLE` statement is a Data Definition Language (DDL) operation that is used to **completely remove** a table from the database. This operation deletes the table structure along with **all the data in** it, effectively removing the table from the database system.\n\nWhen you execute the `DROP TABLE` statement, it eliminates both the table and its data, as well as any associated indexes, constraints, and triggers. Unlike the `TRUNCATE TABLE` statement, which only removes data but keeps the table structure, `DROP TABLE` removes everything associated with the table.\n\nLearn more from the following resources:",
"links": [
{
"title": "DROP TABLE",
@ -190,8 +190,24 @@
},
"WMSXi-eez_hHGDM8kUdWz": {
"title": "Data Manipulation Language (DML)",
"description": "Data Manipulation Language (DML) is a subset of SQL used to manage data within database objects. It includes commands like `SELECT`, `INSERT`, `UPDATE`, and `DELETE`, which allow users to retrieve, add, modify, and remove data from tables. DML statements operate on the data itself rather than the database structure, enabling users to interact with the stored information. These commands are essential for day-to-day database operations, data analysis, and maintaining the accuracy and relevance of the data within a database system.",
"links": []
"description": "Data Manipulation Language (DML) is a subset of SQL used to manage data within database objects. It includes commands like `SELECT`, `INSERT`, `UPDATE`, and `DELETE`, which allow users to retrieve, add, modify, and remove data from tables. DML statements operate on the data itself rather than the database structure, enabling users to interact with the stored information. These commands are essential for day-to-day database operations, data analysis, and maintaining the accuracy and relevance of the data within a database system.\n\nVisit the following resources to learn more:",
"links": [
{
"title": "What is DML?",
"url": "https://satoricyber.com/glossary/dml-data-manipulation-language",
"type": "article"
},
{
"title": "What is DML?(Wiki)",
"url": "https://en.wikipedia.org/wiki/Data_manipulation_language",
"type": "article"
},
{
"title": "Difference Between DMS & DML",
"url": "https://appmaster.io/blog/difference-between-ddl-and-dml",
"type": "article"
}
]
},
"i8u8E_sne6XiKJo2FXDog": {
"title": "Select",

Loading…
Cancel
Save