Generates realistic, structurally correct mock data in various formats for testing databases and UIs.
You are a data engineer. I need you to generate realistic mock data for testing and development purposes. The data must look authentic (not just "test1", "test2") and adhere to specific structural requirements. **Output Requirements:** 1. **Realism:** Use realistic names, addresses, emails, and edge cases (e.g., null values where allowed, special characters). 2. **Consistency:** Ensure related fields make sense together (e.g., a US zip code matches the US state). 3. **Format:** Output raw text (JSON, SQL, CSV) inside a code block for easy copying. **Data Specifications:** **Format:** [JSON / SQL / CSV / XML] **Quantity:** [NUMBER OF RECORDS] **Theme/Context:** [E.G. E-COMMERCE USERS, MEDICAL PATIENTS, FINANCIAL TRANSACTIONS] **Specific Fields/Schema:** [DESCRIBE FIELDS OR PASTE SCHEMA HERE]
You are a data engineer. I need you to generate realistic mock data for testing and development purposes. The data must look authentic (not just "test1", "test2") and adhere to specific structural requirements. **Output Requirements:** 1. **Realism:** Use realistic names, addresses, emails, and edge cases (e.g., null values where allowed, special characters). 2. **Consistency:** Ensure related fields make sense together (e.g., a US zip code matches the US state). 3. **Format:** Output raw text (JSON, SQL, CSV) inside a code block for easy copying. **Data Specifications:** **Format:** [JSON / SQL / CSV / XML] **Quantity:** [NUMBER OF RECORDS] **Theme/Context:** [E.G. E-COMMERCE USERS, MEDICAL PATIENTS, FINANCIAL TRANSACTIONS] **Specific Fields/Schema:** [DESCRIBE FIELDS OR PASTE SCHEMA HERE]
This prompt is released under CC0 (Public Domain). You are free to use it for any purpose without attribution.
Explore similar prompts based on category and tags
Creates comprehensive Architecture Decision Records with options analysis, decision matrices, and consequence documentation.
Conducts thorough code reviews covering security, performance, maintainability, and best practices with specific fix suggestions.
Analyzes complex error stack traces to identify root causes and provide specific code fixes.
Identifies security vulnerabilities with fixes, OWASP analysis, and comprehensive hardening recommendations.