id
stringlengths 40
40
| title
stringlengths 3
59
| context
stringlengths 152
3.36k
| question
stringlengths 1
296
| answers
sequence | metadata
dict |
---|---|---|---|---|---|
6d04c481101239bcf3431fb3cb9fd99ba1586c8b | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | How does this effect history? | {
"text": [
"tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix"
],
"answer_start": [
289
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
7f52ab1483705f9b096cc84d60ff9260149f31d7 | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | How does Kuhn explain science progression | {
"text": [
"competing paradigms or conceptual systems"
],
"answer_start": [
364
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
223d6ffbfd6e464c9140856d982667ec65c56744 | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | How does Thomas Kuhn use this? | {
"text": [
"More recent historical interpretations"
],
"answer_start": [
219
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
72b97fc28cbb176c215ef0b3c195062a84a0972d | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | Thomas Kuhn potrayed the history of science as to also include conceptual systems from other fields and themes, which one relates to the cultures? | {
"text": [
"cultural"
],
"answer_start": [
452
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3434bdca13af4254731470f81e446fcd6dfcf11c | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | The branch of science that involves the study of living organisms, that includes Anatomy is called? | {
"text": [
"biological"
],
"answer_start": [
104
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
31275712399dc6f3b9b10857a7867a58a83813ae | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | What did this thought pattern influence? | {
"text": [
"the history of science"
],
"answer_start": [
49
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
aee32194cf7e2a32915df925079a5b8ed65de7f9 | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | What is included in this interpretation/ | {
"text": [
"intellectual, cultural, economic and political themes outside of science"
],
"answer_start": [
438
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
aa996afe97d6b6fd16d23774ec04fc13000eab7f | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | How did this change science? | {
"text": [
"true theories replaced false beliefs"
],
"answer_start": [
181
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
abf24a56d90d634968507d9695e42461e52a803d | History_of_science | From the 18th century through late 20th century, the history of science, especially of the physical and biological sciences, was often presented in a progressive narrative in which true theories replaced false beliefs. More recent historical interpretations, such as those of Thomas Kuhn, tend to portray the history of science in different terms, such as that of competing paradigms or conceptual systems in a wider matrix that includes intellectual, cultural, economic and political themes outside of science. | The adjective given to objects or concepts related to politics is? | {
"text": [
"political"
],
"answer_start": [
475
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4c84f2a6f5646c0b1ac1d3912eeb14b9e7957b6f | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | How was religion part of this? | {
"text": [
"brought to light a new space for politics and political action"
],
"answer_start": [
181
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
25a12ea5c869ee9814f56e1bd6c75074e43f9876 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | How did religion change? | {
"text": [
"redefining the borders between what was religious and what was political"
],
"answer_start": [
488
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
a16ace845d1c2a22ef2c5f6f4fc353e5f687eef3 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What was the largest spreading belief after the fall of Rome? | {
"text": [
"Christianity"
],
"answer_start": [
167
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
ecded47b0b69b3b1837faa5ba5005321d61a7820 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What was church and state contested? | {
"text": [
"the fall of the Western Roman Empire"
],
"answer_start": [
5
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
83fbea5c29faccf8da13721548dd66b0f7243a8f | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What came fromt he new era? | {
"text": [
"there arose a more diffuse arena for political studies"
],
"answer_start": [
43
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
c7b952d881af68a591c88d5b1c18bfa1cb94159a | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What denotes that discourse was previously more strict? | {
"text": [
"With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4e126a5ed840bd16c8649b173441c543db736b89 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What incited the political questions of state and religious separation? | {
"text": [
"Works such as Augustine of Hippo's The City of God synthesized"
],
"answer_start": [
351
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
49aa37dedbbf683b0a20710d3c4a519787dee0dd | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What brought a new light to politics and political actions? | {
"text": [
"monotheism and, particularly for the Western tradition, Christianity"
],
"answer_start": [
111
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
286fcbdfa92a6692c77bb73f188fddafe6a9c467 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What was the major event that happened during the middle ages? | {
"text": [
"the relationship between Church and State were clarified and contested in this period"
],
"answer_start": [
606
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
556d9ae35ecc61ed92d816563cd4b61ed765d775 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | How did politics shape religion? | {
"text": [
"Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period"
],
"answer_start": [
562
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
8ff1e6e3491728bb7b6f13922df1764443ad5e75 | History_of_science | With the fall of the Western Roman Empire, there arose a more diffuse arena for political studies. The rise of monotheism and, particularly for the Western tradition, Christianity, brought to light a new space for politics and political action[citation needed]. During the Middle Ages, the study of politics was widespread in the churches and courts. Works such as Augustine of Hippo's The City of God synthesized current philosophies and political traditions with those of Christianity, redefining the borders between what was religious and what was political. Most of the political questions surrounding the relationship between Church and State were clarified and contested in this period. | What brought upon monotheism? | {
"text": [
"fall of the Western Roman Empire"
],
"answer_start": [
9
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
56f3259748b30c561c16d8f69bdf31a6d7020840 | History_of_science | In astronomy, Al-Battani improved the measurements of Hipparchus, preserved in the translation of Ptolemy's Hè Megalè Syntaxis (The great treatise) translated as Almagest. Al-Battani also improved the precision of the measurement of the precession of the Earth's axis. The corrections made to the geocentric model by al-Battani, Ibn al-Haytham, Averroes and the Maragha astronomers such as Nasir al-Din al-Tusi, Mo'ayyeduddin Urdi and Ibn al-Shatir are similar to Copernican heliocentric model. Heliocentric theories may have also been discussed by several other Muslim astronomers such as Ja'far ibn Muhammad Abu Ma'shar al-Balkhi, Abu-Rayhan Biruni, Abu Said al-Sijzi, Qutb al-Din al-Shirazi, and Najm al-Dīn al-Qazwīnī al-Kātibī. | __ is also known as Ibn Rushd | {
"text": [
"Averroes"
],
"answer_start": [
345
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
826a52595399426f9e57f4deb9d07e02c44af3ce | History_of_science | In astronomy, Al-Battani improved the measurements of Hipparchus, preserved in the translation of Ptolemy's Hè Megalè Syntaxis (The great treatise) translated as Almagest. Al-Battani also improved the precision of the measurement of the precession of the Earth's axis. The corrections made to the geocentric model by al-Battani, Ibn al-Haytham, Averroes and the Maragha astronomers such as Nasir al-Din al-Tusi, Mo'ayyeduddin Urdi and Ibn al-Shatir are similar to Copernican heliocentric model. Heliocentric theories may have also been discussed by several other Muslim astronomers such as Ja'far ibn Muhammad Abu Ma'shar al-Balkhi, Abu-Rayhan Biruni, Abu Said al-Sijzi, Qutb al-Din al-Shirazi, and Najm al-Dīn al-Qazwīnī al-Kātibī. | The one who improved the measurements of Hipparchus studied? | {
"text": [
"astronomy"
],
"answer_start": [
3
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
2a2735fe3be103babbbe4c514aa0991230ba6189 | History_of_science | In astronomy, Al-Battani improved the measurements of Hipparchus, preserved in the translation of Ptolemy's Hè Megalè Syntaxis (The great treatise) translated as Almagest. Al-Battani also improved the precision of the measurement of the precession of the Earth's axis. The corrections made to the geocentric model by al-Battani, Ibn al-Haytham, Averroes and the Maragha astronomers such as Nasir al-Din al-Tusi, Mo'ayyeduddin Urdi and Ibn al-Shatir are similar to Copernican heliocentric model. Heliocentric theories may have also been discussed by several other Muslim astronomers such as Ja'far ibn Muhammad Abu Ma'shar al-Balkhi, Abu-Rayhan Biruni, Abu Said al-Sijzi, Qutb al-Din al-Shirazi, and Najm al-Dīn al-Qazwīnī al-Kātibī. | __ was a strong proponent of Aristotelianism | {
"text": [
"Averroes"
],
"answer_start": [
345
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0970aaa229e32b093e466da1db51b9580c5a11cd | History_of_science | In astronomy, Al-Battani improved the measurements of Hipparchus, preserved in the translation of Ptolemy's Hè Megalè Syntaxis (The great treatise) translated as Almagest. Al-Battani also improved the precision of the measurement of the precession of the Earth's axis. The corrections made to the geocentric model by al-Battani, Ibn al-Haytham, Averroes and the Maragha astronomers such as Nasir al-Din al-Tusi, Mo'ayyeduddin Urdi and Ibn al-Shatir are similar to Copernican heliocentric model. Heliocentric theories may have also been discussed by several other Muslim astronomers such as Ja'far ibn Muhammad Abu Ma'shar al-Balkhi, Abu-Rayhan Biruni, Abu Said al-Sijzi, Qutb al-Din al-Shirazi, and Najm al-Dīn al-Qazwīnī al-Kātibī. | __ served multiple terms as a judge in Seville and Córdoba | {
"text": [
"Averroes"
],
"answer_start": [
345
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
2b45064289f4ff0d27726e6893e0f28a2478ffcd | History_of_science | In astronomy, Al-Battani improved the measurements of Hipparchus, preserved in the translation of Ptolemy's Hè Megalè Syntaxis (The great treatise) translated as Almagest. Al-Battani also improved the precision of the measurement of the precession of the Earth's axis. The corrections made to the geocentric model by al-Battani, Ibn al-Haytham, Averroes and the Maragha astronomers such as Nasir al-Din al-Tusi, Mo'ayyeduddin Urdi and Ibn al-Shatir are similar to Copernican heliocentric model. Heliocentric theories may have also been discussed by several other Muslim astronomers such as Ja'far ibn Muhammad Abu Ma'shar al-Balkhi, Abu-Rayhan Biruni, Abu Said al-Sijzi, Qutb al-Din al-Shirazi, and Najm al-Dīn al-Qazwīnī al-Kātibī. | Al-Battani's beliefs made him a? | {
"text": [
"Muslim"
],
"answer_start": [
563
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
82deaf4a3adb257c857a8107e0db7d7fcc4ac4f1 | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | Which is not a theory: social darwinism, colonial subjects, cultural evolution? | {
"text": [
"colonial subjects"
],
"answer_start": [
1036
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
c2fde70cd3be5f7e13d70eb9b1f000b0defcb7bd | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | What was the ultimate result of comparing culture and nature? | {
"text": [
"one could classify some countries and nations as more civilized than others and some people as more cultured than others"
],
"answer_start": [
459
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
66bc560ca4ef1ed66ebe5b3cbb8fd3e5dfa8d52f | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | Which philosopher has a hyphen in his name? | {
"text": [
"Rousseau"
],
"answer_start": [
121
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
77586c81b53ef81452c7c9feb8424da847410317 | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | Which is a philosopher: Native Americans, Rousseau, or non-elites? | {
"text": [
"Rousseau"
],
"answer_start": [
121
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
d80d63b2a174312e39c09f9d50d6e12a0f2b3874 | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | What did Arnold and Hobbes both have in their contrast pair? | {
"text": [
"culture"
],
"answer_start": [
27
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
c7ba4f105be16b0d417a387f76480a31435c90ed | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | Under his own theory, what would Spencer have considered himself to be? | {
"text": [
"civilized"
],
"answer_start": [
394
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
1e6202ea5d00bed64186d289d4228d3cbfef0d07 | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | Which is not a person: Spencer, European, or Hobbes? | {
"text": [
"European"
],
"answer_start": [
1001
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
7cbe6d6a259f9e5a51beda9889715d684612171e | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | Who came up with a variation of evolutionary theory named for a famous scientist? | {
"text": [
"Herbert Spencer"
],
"answer_start": [
602
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
6705f4e7840041b775bf0f5916b66507f3f94690 | Culture | Matthew Arnold contrasted "culture" with anarchy; other Europeans, following philosophers Thomas Hobbes and Jean-Jacques Rousseau, contrasted "culture" with "the state of nature". According to Hobbes and Rousseau, the Native Americans who were being conquered by Europeans from the 16th centuries on were living in a state of nature; this opposition was expressed through the contrast between "civilized" and "uncivilized." According to this way of thinking, one could classify some countries and nations as more civilized than others and some people as more cultured than others. This contrast led to Herbert Spencer's theory of Social Darwinism and Lewis Henry Morgan's theory of cultural evolution. Just as some critics have argued that the distinction between high and low cultures is really an expression of the conflict between European elites and non-elites, some critics have argued that the distinction between civilized and uncivilized people is really an expression of the conflict between European colonial powers and their colonial subjects. | What is the parallel between high and low cultures? | {
"text": [
"civilized and uncivilized people"
],
"answer_start": [
920
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
59c508379c2b26efe98954dd2db943acac6ce1cb | Culture | Scholars in the United Kingdom and the United States developed somewhat different versions of cultural studies after the late 1970s. The British version of cultural studies had originated in the 1950s and 1960s, mainly under the influence first of Richard Hoggart, E. P. Thompson, and Raymond Williams, and later that of Stuart Hall and others at the Centre for Contemporary Cultural Studies at the University of Birmingham. This included overtly political, left-wing views, and criticisms of popular culture as "capitalist" mass culture; it absorbed some of the ideas of the Frankfurt School critique of the "culture industry" (i.e. mass culture). This emerges in the writings of early British cultural-studies scholars and their influences: see the work of (for example) Raymond Williams, Stuart Hall, Paul Willis, and Paul Gilroy. | The Kingdom and the States are both? | {
"text": [
"United"
],
"answer_start": [
39
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0d5ecaa50f1f32a56a091dc7aa4bdfacdf37cccc | Culture | Scholars in the United Kingdom and the United States developed somewhat different versions of cultural studies after the late 1970s. The British version of cultural studies had originated in the 1950s and 1960s, mainly under the influence first of Richard Hoggart, E. P. Thompson, and Raymond Williams, and later that of Stuart Hall and others at the Centre for Contemporary Cultural Studies at the University of Birmingham. This included overtly political, left-wing views, and criticisms of popular culture as "capitalist" mass culture; it absorbed some of the ideas of the Frankfurt School critique of the "culture industry" (i.e. mass culture). This emerges in the writings of early British cultural-studies scholars and their influences: see the work of (for example) Raymond Williams, Stuart Hall, Paul Willis, and Paul Gilroy. | Left-wing ideas were against what economic structure? | {
"text": [
"capitalist"
],
"answer_start": [
513
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3c1fc73bb33d15c7533c5dbdb2b3ce48a01b98a3 | Culture | Scholars in the United Kingdom and the United States developed somewhat different versions of cultural studies after the late 1970s. The British version of cultural studies had originated in the 1950s and 1960s, mainly under the influence first of Richard Hoggart, E. P. Thompson, and Raymond Williams, and later that of Stuart Hall and others at the Centre for Contemporary Cultural Studies at the University of Birmingham. This included overtly political, left-wing views, and criticisms of popular culture as "capitalist" mass culture; it absorbed some of the ideas of the Frankfurt School critique of the "culture industry" (i.e. mass culture). This emerges in the writings of early British cultural-studies scholars and their influences: see the work of (for example) Raymond Williams, Stuart Hall, Paul Willis, and Paul Gilroy. | whose version of cultural studies criticized popular culture as capitalist | {
"text": [
"The British version"
],
"answer_start": [
133
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
e26c6261509a17f05063a2d6b5fde3ceb17dfdb7 | Culture | Scholars in the United Kingdom and the United States developed somewhat different versions of cultural studies after the late 1970s. The British version of cultural studies had originated in the 1950s and 1960s, mainly under the influence first of Richard Hoggart, E. P. Thompson, and Raymond Williams, and later that of Stuart Hall and others at the Centre for Contemporary Cultural Studies at the University of Birmingham. This included overtly political, left-wing views, and criticisms of popular culture as "capitalist" mass culture; it absorbed some of the ideas of the Frankfurt School critique of the "culture industry" (i.e. mass culture). This emerges in the writings of early British cultural-studies scholars and their influences: see the work of (for example) Raymond Williams, Stuart Hall, Paul Willis, and Paul Gilroy. | when did the united kingdom develop thier cultural studies | {
"text": [
"1950s and 1960s"
],
"answer_start": [
195
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
62b436d732feb5201411b8bedba348d4d07c20da | Culture | Scholars in the United Kingdom and the United States developed somewhat different versions of cultural studies after the late 1970s. The British version of cultural studies had originated in the 1950s and 1960s, mainly under the influence first of Richard Hoggart, E. P. Thompson, and Raymond Williams, and later that of Stuart Hall and others at the Centre for Contemporary Cultural Studies at the University of Birmingham. This included overtly political, left-wing views, and criticisms of popular culture as "capitalist" mass culture; it absorbed some of the ideas of the Frankfurt School critique of the "culture industry" (i.e. mass culture). This emerges in the writings of early British cultural-studies scholars and their influences: see the work of (for example) Raymond Williams, Stuart Hall, Paul Willis, and Paul Gilroy. | what country is the university of birmingham located | {
"text": [
"United Kingdom"
],
"answer_start": [
16
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3ba6ed8048fb7a9c3cc7c61b49e7f565ca0dd4a5 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | who opted for availability? | {
"text": [
"Lamb"
],
"answer_start": [
458
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9f25204e072ea6a757481930cc676606bb3edca0 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | Who did the first editor of the Sun view the Mirror's targeted audience as? | {
"text": [
"ageing readership"
],
"answer_start": [
439
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
322562339b0c64ed63b83f31e14913286fc1045b | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | What is the name of the paper in this passage? | {
"text": [
"the new Sun"
],
"answer_start": [
170
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
879368ed565b3b0c0ca866e4bcbc5e9251ef8e5b | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | whose view? | {
"text": [
"Murdoch"
],
"answer_start": [
300
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
6f123e0f8a4988ffa998cd465994796c8b990d45 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | Lamb has who to thank for his job as editor? | {
"text": [
"Murdoch"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
07dbd3af91f9c039d2a6a9d75f36713f072fd661 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | Who shared Murdoch's view of how best to judge the quality of a paper? | {
"text": [
"Lamb"
],
"answer_start": [
128
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
b48fc5c0998c3fb106f640cb3aef31bf6dd999ba | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | For whom were the 125 new reporters hired? | {
"text": [
"the new Sun"
],
"answer_start": [
170
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
66ba6e413f63124d863d254b63285066d96463a2 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | lamb was? | {
"text": [
"senior sub-editor"
],
"answer_start": [
270
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
541833dd52519134dc2613528173e257d4b7fb2a | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | what is the first word in the second paragraph? | {
"text": [
"was"
],
"answer_start": [
186
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
a537b9649e7878c4740a26316933e21cfb063c16 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | Who had been employed by the Mirror? | {
"text": [
"Lamb"
],
"answer_start": [
128
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4a0f88491f9fd7f87d91dea0782b18b4014d85f3 | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | Why were other recruits not interviewed? | {
"text": [
"rapport with Larry Lamb"
],
"answer_start": [
28
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0b0048d8859bf6edaf00840f1b67d9537f4e0ecc | The_Sun_(United_Kingdom) | Murdoch found he had such a rapport with Larry Lamb over lunch that other potential recruits as editor were not interviewed and Lamb was appointed as the first editor of the new Sun. He was scathing in his opinion of the Mirror, where he had recently been employed as a senior sub-editor, and shared Murdoch's view that a paper's quality was best measured by its sales, and he regarded the Mirror as overstaffed, and primarily aimed at an ageing readership. Lamb hastily recruited a staff of about 125 reporters, who were mostly selected for their availability rather than their ability. | Lamb moved from the Mirror to which paper? | {
"text": [
"the new Sun"
],
"answer_start": [
170
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
8d7d8b433415ed311652325fd4d3aa2667bf4dc6 | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | What was the result of Lamb's decision? | {
"text": [
"Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic"
],
"answer_start": [
441
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
d85f1a523948ebf1024ab155d90ca2dd3828db5b | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | How did the government react? | {
"text": [
"A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content"
],
"answer_start": [
625
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4ca3d8e3013bd95a628c564bfda1a54c24fe93b4 | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | What happened to the third page of the paper after the first anniversary publication? | {
"text": [
"A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses"
],
"answer_start": [
346
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
d596660bda5e9aa1a495382a08b959764e3a6c5f | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | What was banned in Yorkshire because of its sexual content? | {
"text": [
"the relaunched Sun"
],
"answer_start": [
326
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
b282db38ea85b381bf9dfbabf44dcf9319ad687e | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | Which paper had sex as its selling point? | {
"text": [
"Sun"
],
"answer_start": [
341
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9262667a3f9092a56a3ae462885441afd1b57854 | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | Why did the marketing differ? | {
"text": [
"Lamb believed was the most important part of his readers' lives"
],
"answer_start": [
98
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fc44611e0b820970b5cc515ce72546b737deadf1 | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | How did the change work? | {
"text": [
"The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a \"Birthday Suit Girl\" to mark the first anniversary of the relaunched Sun"
],
"answer_start": [
163
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
31789a6c6e85e833e970e68dcd56dca52ab67087 | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | Where did the first lady to appear on the third page of the Sun originate from? | {
"text": [
"German-born"
],
"answer_start": [
224
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3fd5113fbafb63e3bdcf3a04bebdc1707077208c | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | What was the result? | {
"text": [
"Lamb expressed some regret at introducing the feature, although denied it was sexist"
],
"answer_start": [
539
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fe1424882746388d2b1cf7adc2181f6db92d3880 | The_Sun_(United_Kingdom) | Sex was used as an important element in the content and marketing the paper from the start, which Lamb believed was the most important part of his readers' lives. The first topless Page 3 model appeared on 17 November 1970, German-born Stephanie Rahn; she was tagged as a "Birthday Suit Girl" to mark the first anniversary of the relaunched Sun. A topless Page 3 model gradually became a regular fixture, and with increasingly risqué poses. Both feminists and many cultural conservatives saw the pictures as pornographic and misogynistic. Lamb expressed some regret at introducing the feature, although denied it was sexist. A Conservative council in Sowerby Bridge, Yorkshire, was the first to ban the paper from its public library, shortly after Page 3 began, because of its excessive sexual content. This decision was reversed after a sustained campaign by the newspaper itself lasting 16 months, and the election of a Labour-led council in 1971. | How did Lamb feel about Page 3? | {
"text": [
"some regret at introducing the feature, although denied it was sexist"
],
"answer_start": [
554
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
c0b9562a11763f2d578c305ed20dedb296b52a15 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | Which of the following is not an example of a sensor: cameras, microphones, or financial account information? | {
"text": [
"financial account information"
],
"answer_start": [
95
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
7656bfa6b5a458d328711809de0f5c81ab367810 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | Which of the following is not a mobile device: smart phones, activity trackers, or passwords? | {
"text": [
"passwords"
],
"answer_start": [
82
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
5c254316453de3e10716e287636ac3b2b9596e8b | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | What needs securing? | {
"text": [
"passwords or financial account information"
],
"answer_start": [
82
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
e820a488018e43bb32695a5869f00116e32fee4f | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | What should be secured? | {
"text": [
"Wifi, Bluetooth, and cell phone network"
],
"answer_start": [
539
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
eb7f00bea93dd277fe1ce356027c57768ae7b1fa | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | What are Quantified Self devices? | {
"text": [
"activity trackers"
],
"answer_start": [
286
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
f6ffa6d1fe3b0558219030723c808cadd5001144 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | Which of the following is not a possible attack vector: Bluetooth, cell phone network, or passwords? | {
"text": [
"passwords"
],
"answer_start": [
82
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
32d1a14324979857464989e310a7f961061b9adc | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | How has the hacking expanded? | {
"text": [
"Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information"
],
"answer_start": [
177
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
2c7aa708635a8d87ac51ba15f6a0b634885822dc | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | What is malware regularly using to attack? | {
"text": [
"Desktop computers and laptops"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0f0ed0bac84d91d01cd9a6147d5ba769d558d615 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | How does this attack a computeR? | {
"text": [
"gather passwords or financial account information"
],
"answer_start": [
75
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
6417b7bdabc47fd5ffe350bed3eaf3abbed6b216 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | How is the attack conducted? | {
"text": [
"construct a botnet to attack another target"
],
"answer_start": [
132
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0e8c5fcf084b52f31035fc93a58ab26509bfed73 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | What are examples of Quantified Self gadgets? | {
"text": [
"cameras, microphones, GPS receivers, compasses, and accelerometers"
],
"answer_start": [
368
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
7fc3554fa71676ccd96d6b46291262c6aaff39b3 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | What is malware? | {
"text": [
"collect personal information"
],
"answer_start": [
469
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fc96d5c550a1e4a538d914e886802d62b5670706 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. | Which of the following are not commonly infected with malware: laptops, desktop computers, or accelerometers? | {
"text": [
"accelerometers"
],
"answer_start": [
420
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
5fc94ebad236dbb3756b380a1a86d8d3993838c3 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | How refined is Rescator considered? | {
"text": [
"unsophisticated and uninteresting"
],
"answer_start": [
450
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
324390e324999c72e87b1257b27b398e50be258e | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What allowed Rescator to succeed? | {
"text": [
"physical security breaches using self checkout machines"
],
"answer_start": [
316
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fb55ea6fdf793dccb2746e77142e76d541ff7bf3 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What was a glaring error made by the companies spoken about? | {
"text": [
"Warnings were delivered at both corporations, but ignored"
],
"answer_start": [
257
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
a0a01ff81282a3a66551a2df6436219c5a8976ca | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | How could Rescator be thwarted? | {
"text": [
"existing antivirus software"
],
"answer_start": [
644
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
634523240dd89dc103a6afc48ce4a711ee346a3d | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | In what state is the software that would have been needed to stop the attacks? | {
"text": [
"existing"
],
"answer_start": [
644
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
bf6b68d7e6f384a7dc7eed4364caf30aee325b88 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Which company was attacked first? | {
"text": [
"Target Corporation"
],
"answer_start": [
82
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
84e42de8bb02620585630908b2a78bf7a5d408b6 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What was deemed too insignificant to act upon? | {
"text": [
"Warnings"
],
"answer_start": [
257
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
cd15caf62ab71334b21842a08550d3d1ada83b87 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | The takeaway from what Walter said is what? | {
"text": [
"In"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
c0e59b8204b6e51f0ddf15cceee098ebedcd855e | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | The larger hack followed the stealing of roughly 40 million credit cards in what year? | {
"text": [
"2014"
],
"answer_start": [
195
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
b6ac887ed3e209827ceca672a37a9ccc72f1ce2b | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What is the overall conclusion of the whole situation? | {
"text": [
"the investigation is ongoing"
],
"answer_start": [
826
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
811c9fa13c9674f091bb5d4087041d155a1a7752 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What type of role did self checkouts play in the breaches? | {
"text": [
"large"
],
"answer_start": [
402
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4fdc6ff94bec586655154374127d7b352fe2794a | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What is the main point of the passage? | {
"text": [
"resulted in major attention from state and Federal United States authorities and the investigation is ongoing"
],
"answer_start": [
745
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9dd7f5cfaf0739decbd17bded2bde4c2208b4a57 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What is guarded by cybersecurity? | {
"text": [
"information systems"
],
"answer_start": [
84
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
78ed1840d519f8eed7167ae8d1329b53a5f7ce80 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What protection does computer security provide to software? | {
"text": [
"disruption or misdirection of the services"
],
"answer_start": [
204
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
dacb74771ff79477629cc0e52e85529222093338 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What can be injected into hardware besides code? | {
"text": [
"data"
],
"answer_start": [
387
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
5826fdf9238c2b990a8dac9302f2e18955148f0e | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | Why might a law firm need cybersecurity? | {
"text": [
"protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide"
],
"answer_start": [
70
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
87f2fa27b57a6853cb97e5a3db83235bb48923e7 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What is a non physical thing that is put into hardware when cybersecurity is compromised? | {
"text": [
"data and code"
],
"answer_start": [
387
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4022c1136c07ae2502806756b867b1296d1d9cfa | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What does computer security prevent? | {
"text": [
"harm that may come via network access, data and code injection, and due to malpractice by operators"
],
"answer_start": [
348
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
efeddb2d46b7ee60f8d733a2820a6764b0da4989 | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What does computer security do? | {
"text": [
"controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators"
],
"answer_start": [
273
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
a31d71e25ec72fdc8fe29761f303e76b88accead | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What can be done to harm hardware? | {
"text": [
"theft or damage"
],
"answer_start": [
109
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
8c04efa89d06f346e967f931b7790343475210de | Computer_security | Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. | What is protected by cybersecurity? | {
"text": [
"hardware, the software, and to the information on them"
],
"answer_start": [
132
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
82decafc5c8dea93fc2449fb3db87e464acd3f3a | Warsaw_Pact | The Warsaw Pact (formally, the Treaty of Friendship, Co-operation, and Mutual Assistance, sometimes, informally WarPac, akin in format to NATO) was a collective defense treaty among Soviet Union and seven Soviet satellite states in Central and Eastern Europe in existence during the Cold War. The Warsaw Pact was the military complement to the Council for Mutual Economic Assistance (CoMEcon), the regional economic organization for the communist states of Central and Eastern Europe. The Warsaw Pact was created in reaction to the integration of West Germany into NATO in 1955 per the Paris Pacts of 1954, but it is also considered to have been motivated by Soviet desires to maintain control over military forces in Central and Eastern Europe. | What was the purported reasoning of Russia when they penned the Warsaw Pact? | {
"text": [
"created in reaction to the integration of West Germany into NATO in 1955 per the Paris Pacts of 1954"
],
"answer_start": [
505
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
093dd38dd166e70c9fe87376cc213750ba97aed4 | Warsaw_Pact | The Warsaw Pact (formally, the Treaty of Friendship, Co-operation, and Mutual Assistance, sometimes, informally WarPac, akin in format to NATO) was a collective defense treaty among Soviet Union and seven Soviet satellite states in Central and Eastern Europe in existence during the Cold War. The Warsaw Pact was the military complement to the Council for Mutual Economic Assistance (CoMEcon), the regional economic organization for the communist states of Central and Eastern Europe. The Warsaw Pact was created in reaction to the integration of West Germany into NATO in 1955 per the Paris Pacts of 1954, but it is also considered to have been motivated by Soviet desires to maintain control over military forces in Central and Eastern Europe. | Who had covert reasons for doing something? | {
"text": [
"Soviet Union"
],
"answer_start": [
182
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
927cecd1282753f3edfdc983cf4fce9bc914d232 | Warsaw_Pact | The Warsaw Pact (formally, the Treaty of Friendship, Co-operation, and Mutual Assistance, sometimes, informally WarPac, akin in format to NATO) was a collective defense treaty among Soviet Union and seven Soviet satellite states in Central and Eastern Europe in existence during the Cold War. The Warsaw Pact was the military complement to the Council for Mutual Economic Assistance (CoMEcon), the regional economic organization for the communist states of Central and Eastern Europe. The Warsaw Pact was created in reaction to the integration of West Germany into NATO in 1955 per the Paris Pacts of 1954, but it is also considered to have been motivated by Soviet desires to maintain control over military forces in Central and Eastern Europe. | Why else was the Warsaw pact formed? | {
"text": [
"motivated by Soviet desires to maintain control over military forces in Central and Eastern Europe"
],
"answer_start": [
646
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
39d179baa3d8df4f06bf8935f021041b2e6eb277 | Warsaw_Pact | The Warsaw Pact (formally, the Treaty of Friendship, Co-operation, and Mutual Assistance, sometimes, informally WarPac, akin in format to NATO) was a collective defense treaty among Soviet Union and seven Soviet satellite states in Central and Eastern Europe in existence during the Cold War. The Warsaw Pact was the military complement to the Council for Mutual Economic Assistance (CoMEcon), the regional economic organization for the communist states of Central and Eastern Europe. The Warsaw Pact was created in reaction to the integration of West Germany into NATO in 1955 per the Paris Pacts of 1954, but it is also considered to have been motivated by Soviet desires to maintain control over military forces in Central and Eastern Europe. | What did the Soviets likely see as a threat? | {
"text": [
"the integration of West Germany into NATO"
],
"answer_start": [
528
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
7ca997b8bb3857bd36d0652d25c6ded69eaf633a | Warsaw_Pact | The Warsaw Pact (formally, the Treaty of Friendship, Co-operation, and Mutual Assistance, sometimes, informally WarPac, akin in format to NATO) was a collective defense treaty among Soviet Union and seven Soviet satellite states in Central and Eastern Europe in existence during the Cold War. The Warsaw Pact was the military complement to the Council for Mutual Economic Assistance (CoMEcon), the regional economic organization for the communist states of Central and Eastern Europe. The Warsaw Pact was created in reaction to the integration of West Germany into NATO in 1955 per the Paris Pacts of 1954, but it is also considered to have been motivated by Soviet desires to maintain control over military forces in Central and Eastern Europe. | What did the Warsaw pact go alongside with? | {
"text": [
"CoMEcon"
],
"answer_start": [
384
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
Subsets and Splits