Also known as "parameterized queries." This ensures the database treats the input as text, not as executable code.
This specific payload is designed to be "invisible" to the user but "loud" to the attacker's tools: Also known as "parameterized queries
The first part of your string mentions