This specific payload is used in a , where an attacker attempts to combine results from a secondary query with the original one.
The text you provided is a used to determine the number of columns returned by a vulnerable database query. Purpose and Breakdown