<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>sql on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/sql/</link><description>Recent content in sql on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 01 Nov 2021 04:20:49 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/sql/index.xml" rel="self" type="application/rss+xml"/><item><title>SQL Murder Mystery</title><link>https://ahessmat.netlify.com/post/2021-11-sql-murder-mystery/</link><pubDate>Mon, 01 Nov 2021 04:20:49 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2021-11-sql-murder-mystery/</guid><description>During a recent trip, I had a go with a training site I discovered: A SQL Murder Mystery. This website is a clever method for getting oriented to the syntax used for querying SQL databases.
The premise of the website is that you are tasked with (re)discovering a lost case file and identifying a murder suspect. All of the information needed to accomplish this is available within the SQLite database, but it&amp;rsquo;s incumbent upon you to google and apply the necessary methods in order to make this happen.</description></item></channel></rss>