gem_id
stringlengths
20
25
id
stringlengths
24
24
title
stringlengths
3
59
context
stringlengths
151
3.71k
question
stringlengths
1
270
target
stringlengths
1
270
references
list
answers
dict
gem-squad_v2-train-18000
5a10dac206e79900185c3427
Internet_service_provider
A mailbox provider is an organization that provides services for hosting electronic mail domains with access to storage for mail boxes. It provides email servers to send, receive, accept, and store email for end users or other organizations.
Who allows people to send but not accept in-store mail?
Who allows people to send but not accept in-store mail?
[ "Who allows people to send but not accept in-store mail?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18001
5a10dac206e79900185c3428
Internet_service_provider
A mailbox provider is an organization that provides services for hosting electronic mail domains with access to storage for mail boxes. It provides email servers to send, receive, accept, and store email for end users or other organizations.
Who invented male domains?
Who invented male domains?
[ "Who invented male domains?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18002
56dfbf91231d4119001abd83
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
What is SMTP?
What is SMTP?
[ "What is SMTP?" ]
{ "text": [ "Simple Mail Transfer Protocol" ], "answer_start": [ 390 ] }
gem-squad_v2-train-18003
56dfbf91231d4119001abd84
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
What is IMAP?
What is IMAP?
[ "What is IMAP?" ]
{ "text": [ "Internet Message Access Protocol" ], "answer_start": [ 477 ] }
gem-squad_v2-train-18004
56dfbf91231d4119001abd85
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
How is access to mail provided?
How is access to mail provided?
[ "How is access to mail provided? " ]
{ "text": [ "implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol." ], "answer_start": [ 377 ] }
gem-squad_v2-train-18005
56dfbf91231d4119001abd86
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
what are most mailbox providers as well?
what are most mailbox providers as well?
[ "what are most mailbox providers as well? " ]
{ "text": [ "access providers" ], "answer_start": [ 32 ] }
gem-squad_v2-train-18006
56dfbf91231d4119001abd87
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
who possibly controls their own mail servers?
who possibly controls their own mail servers?
[ "who possibly controls their own mail servers? " ]
{ "text": [ "companies, universities, organizations, groups, and individuals" ], "answer_start": [ 232 ] }
gem-squad_v2-train-18007
5a10dce006e79900185c342d
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
All mailbox providers were also what?
All mailbox providers were also what?
[ "All mailbox providers were also what?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18008
5a10dce006e79900185c342e
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
What are examples of access providers?
What are examples of access providers?
[ "What are examples of access providers?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18009
5a10dce006e79900185c342f
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
What is used by organizations that depend on others to provide mail services?
What is used by organizations that depend on others to provide mail services?
[ "What is used by organizations that depend on others to provide mail services?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18010
5a10dce006e79900185c3430
Internet_service_provider
Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol.
How is traditional male provided?
How is traditional male provided?
[ "How is traditional male provided?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18011
56dfc016231d4119001abd8d
Internet_service_provider
Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation.
What do internet hosting services provide?
What do internet hosting services provide?
[ "What do internet hosting services provide? " ]
{ "text": [ "email, web-hosting, or online storage services" ], "answer_start": [ 34 ] }
gem-squad_v2-train-18012
56dfc016231d4119001abd8e
Internet_service_provider
Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation.
Who provides a virtual server service?
Who provides a virtual server service?
[ "Who provides a virtual server service?" ]
{ "text": [ "Internet hosting services" ], "answer_start": [ 0 ] }
gem-squad_v2-train-18013
56dfc016231d4119001abd8f
Internet_service_provider
Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation.
who provides cloud services?
who provides cloud services?
[ "who provides cloud services?" ]
{ "text": [ "Internet hosting services" ], "answer_start": [ 0 ] }
gem-squad_v2-train-18014
5a10dd9906e79900185c3435
Internet_service_provider
Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation.
Internet hosting protocols provide what?
Internet hosting protocols provide what?
[ "Internet hosting protocols provide what?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18015
5a10dd9906e79900185c3436
Internet_service_provider
Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation.
Who provides physical servers to customers
Who provides physical servers to customers
[ "Who provides physical servers to customers" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18016
5a10dd9906e79900185c3437
Internet_service_provider
Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation.
Who provides off-line storage services
Who provides off-line storage services
[ "Who provides off-line storage services" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18017
56dfc0ae231d4119001abd95
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
Who does an ISP pay for internet access?
Who does an ISP pay for internet access?
[ "Who does an ISP pay for internet access?" ]
{ "text": [ "upstream ISPs" ], "answer_start": [ 74 ] }
gem-squad_v2-train-18018
56dfc0ae231d4119001abd96
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
Why does an ISP need to pay an upstream ISP?
Why does an ISP need to pay an upstream ISP?
[ "Why does an ISP need to pay an upstream ISP?" ]
{ "text": [ "An upstream ISP usually has a larger network than the contracting ISP" ], "answer_start": [ 109 ] }
gem-squad_v2-train-18019
56dfc0ae231d4119001abd97
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
What does an upstream ISP provide for an ISP?
What does an upstream ISP provide for an ISP?
[ "What does an upstream ISP provide for an ISP?" ]
{ "text": [ "access to parts of the Internet the contracting ISP by itself has no access to" ], "answer_start": [ 226 ] }
gem-squad_v2-train-18020
56dfc0ae231d4119001abd99
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
what usually has a larger network, the ISP of the customer or the upstream ISP?
what usually has a larger network, the ISP of the customer or the upstream ISP?
[ "what usually has a larger network, the ISP of the customer or the upstream ISP?" ]
{ "text": [ "upstream ISPs" ], "answer_start": [ 74 ] }
gem-squad_v2-train-18021
5a10dee906e79900185c343b
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
What do ISPs pay customers for?
What do ISPs pay customers for?
[ "What do ISPs pay customers for?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18022
5a10dee906e79900185c343c
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
What usually has a small network than a contracting ISP?
What usually has a small network than a contracting ISP?
[ "What usually has a small network than a contracting ISP?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18023
5a10dee906e79900185c343d
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
What does an upstream ISP provide for customers?
What does an upstream ISP provide for customers?
[ "What does an upstream ISP provide for customers?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18024
5a10dee906e79900185c343e
Internet_service_provider
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to.
What does the contracting ISP have access to that the upstream ISP does not?
What does the contracting ISP have access to that the upstream ISP does not?
[ "What does the contracting ISP have access to that the upstream ISP does not?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18025
56dfc22f7aa994140058e13f
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
What is the simplest case of an ISP using an upstream ISP?
What is the simplest case of an ISP using an upstream ISP?
[ "What is the simplest case of an ISP using an upstream ISP? " ]
{ "text": [ "transmit data to or from areas of the Internet beyond the home network" ], "answer_start": [ 91 ] }
gem-squad_v2-train-18026
56dfc22f7aa994140058e140
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
what do transit ISPs provide?
what do transit ISPs provide?
[ "what do transit ISPs provide? " ]
{ "text": [ "large amounts of bandwidth for connecting hosting ISPs and access ISPs" ], "answer_start": [ 573 ] }
gem-squad_v2-train-18027
56dfc22f7aa994140058e141
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
A mode of interconnection is often cascaded multiple times until reaching what?
A mode of interconnection is often cascaded multiple times until reaching what?
[ "A mode of interconnection is often cascaded multiple times until reaching what?" ]
{ "text": [ "a tier 1 carrier" ], "answer_start": [ 240 ] }
gem-squad_v2-train-18028
56dfc22f7aa994140058e142
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
What is a PoP?
What is a PoP?
[ "What is a PoP?" ]
{ "text": [ "point of presence" ], "answer_start": [ 331 ] }
gem-squad_v2-train-18029
56dfc22f7aa994140058e143
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
What provides bandwidth for the connecting of hosting ISPs and access ISPs?
What provides bandwidth for the connecting of hosting ISPs and access ISPs?
[ "What provides bandwidth for the connecting of hosting ISPs and access ISPs?" ]
{ "text": [ "Transit ISPs" ], "answer_start": [ 552 ] }
gem-squad_v2-train-18030
5a10e0bf06e79900185c3443
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
Who provides minimal amounts of bandwidth for connecting ISPs?
Who provides minimal amounts of bandwidth for connecting ISPs?
[ "Who provides minimal amounts of bandwidth for connecting ISPs?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18031
5a10e0bf06e79900185c3444
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
What is a point of protocol abbreviated as?
What is a point of protocol abbreviated as?
[ "What is a point of protocol abbreviated as?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18032
5a10e0bf06e79900185c3445
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
What has the same connection to an upstream ISP?
What has the same connection to an upstream ISP?
[ "What has the same connection to an upstream ISP?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18033
5a10e0bf06e79900185c3446
Internet_service_provider
In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs.
What transmits Internet within the home?
What transmits Internet within the home?
[ "What transmits Internet within the home?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18034
56dfc2de231d4119001abdaf
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
What is a VISP?
What is a VISP?
[ "What is a VISP?" ]
{ "text": [ "virtual ISP" ], "answer_start": [ 2 ] }
gem-squad_v2-train-18035
56dfc2de231d4119001abdb1
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
What do VISPs resemble?
What do VISPs resemble?
[ "What do VISPs resemble? " ]
{ "text": [ "mobile virtual network operators" ], "answer_start": [ 275 ] }
gem-squad_v2-train-18036
56dfc2de231d4119001abdb2
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
What do visps purchase services from?
What do visps purchase services from?
[ "What do visps purchase services from? " ]
{ "text": [ "a wholesale ISP" ], "answer_start": [ 96 ] }
gem-squad_v2-train-18037
5a10e2b206e79900185c344b
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
Who does an ISP purchase services from?
Who does an ISP purchase services from?
[ "Who does an ISP purchase services from?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18038
5a10e2b206e79900185c344c
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
Who do wholesale ISP purchased services from?
Who do wholesale ISP purchased services from?
[ "Who do wholesale ISP purchased services from?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18039
5a10e2b206e79900185c344d
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
What do virtual network operators resemble?
What do virtual network operators resemble?
[ "What do virtual network operators resemble?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18040
5a10e2b206e79900185c344e
Internet_service_provider
A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications.
How do VISP's customers access the Internet?
How do VISP's customers access the Internet?
[ "How do VISP's customers access the Internet?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18041
56dfc3487aa994140058e167
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
What are free ISPs?
What are free ISPs?
[ "What are free ISPs?" ]
{ "text": [ "Internet service providers that provide service free of charge" ], "answer_start": [ 14 ] }
gem-squad_v2-train-18042
56dfc3487aa994140058e168
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
What do free ISPs display in exchange for service?
What do free ISPs display in exchange for service?
[ "What do free ISPs display in exchange for service?" ]
{ "text": [ "advertisements" ], "answer_start": [ 101 ] }
gem-squad_v2-train-18043
56dfc3487aa994140058e169
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
What are free ISPs similar to?
What are free ISPs similar to?
[ "What are free ISPs similar to? " ]
{ "text": [ "commercial television" ], "answer_start": [ 150 ] }
gem-squad_v2-train-18044
56dfc3487aa994140058e16b
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
How are freenets run?
How are freenets run?
[ "How are freenets run? " ]
{ "text": [ "on a nonprofit basis" ], "answer_start": [ 293 ] }
gem-squad_v2-train-18045
5a10e3cc06e79900185c3453
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
What type of ISPs are free of restrictions?
What type of ISPs are free of restrictions?
[ "What type of ISPs are free of restrictions?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18046
5a10e3cc06e79900185c3454
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
Who accepts donations instead of charging for services?
Who accepts donations instead of charging for services?
[ "Who accepts donations instead of charging for services?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18047
5a10e3cc06e79900185c3455
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
What kind of television are free ISPs like?
What kind of television are free ISPs like?
[ "What kind of television are free ISPs like?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18048
5a10e3cc06e79900185c3456
Internet_service_provider
Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed]
What are for-profit ISPs called?
What are for-profit ISPs called?
[ "What are for-profit ISPs called?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18049
56dfc3c77aa994140058e171
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What is a WISP?
What is a WISP?
[ "What is a WISP? " ]
{ "text": [ "wireless Internet service provider" ], "answer_start": [ 2 ] }
gem-squad_v2-train-18050
56dfc3c77aa994140058e172
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What technology is part of a WISP?
What technology is part of a WISP?
[ "What technology is part of a WISP?" ]
{ "text": [ "commonplace Wi-Fi wireless mesh networking, or proprietary equipment" ], "answer_start": [ 144 ] }
gem-squad_v2-train-18051
56dfc3c77aa994140058e173
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What are some bands that Wi-Fi can operate over?
What are some bands that Wi-Fi can operate over?
[ "What are some bands that Wi-Fi can operate over? " ]
{ "text": [ "900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands" ], "answer_start": [ 243 ] }
gem-squad_v2-train-18052
56dfc3c77aa994140058e174
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What is a wireless internet service provider's network based on?
What is a wireless internet service provider's network based on?
[ "What is a wireless internet service provider's network based on?" ]
{ "text": [ "wireless networking" ], "answer_start": [ 100 ] }
gem-squad_v2-train-18053
5a10e4ae06e79900185c345b
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What is a wired Internet service provider?
What is a wired Internet service provider?
[ "What is a wired Internet service provider?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18054
5a10e4ae06e79900185c345c
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What kind of uncommon networking is used for WISPs
What kind of uncommon networking is used for WISPs
[ "What kind of uncommon networking is used for WISPs" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18055
5a10e4ae06e79900185c345d
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What operates unlicensed frequencies?
What operates unlicensed frequencies?
[ "What operates unlicensed frequencies?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18056
5a10e4ae06e79900185c345e
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
What is designed to operate under open 900 MHz
What is designed to operate under open 900 MHz
[ "What is designed to operate under open 900 MHz" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18057
5a10e4ae06e79900185c345f
Internet_service_provider
A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed]
W ISP do not operate in what band?
W ISP do not operate in what band?
[ "W ISP do not operate in what band?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18058
56dfc460231d4119001abdc3
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
What is peering?
What is peering?
[ "What is peering? " ]
{ "text": [ "multiple ISPs interconnect at peering points or Internet exchange points" ], "answer_start": [ 34 ] }
gem-squad_v2-train-18059
56dfc460231d4119001abdc4
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
What does peering allow?
What does peering allow?
[ "What does peering allow? " ]
{ "text": [ "routing of data between each network, without charging one another for the data transmitted" ], "answer_start": [ 123 ] }
gem-squad_v2-train-18060
56dfc460231d4119001abdc5
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
Why is peering used?
Why is peering used?
[ "Why is peering used? " ]
{ "text": [ "data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP" ], "answer_start": [ 215 ] }
gem-squad_v2-train-18061
56dfc460231d4119001abdc6
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
What are IXs?
What are IXs?
[ "What are IXs? " ]
{ "text": [ "Internet exchange points" ], "answer_start": [ 82 ] }
gem-squad_v2-train-18062
56dfc460231d4119001abdc7
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
Where do multiple ISPs connect?
Where do multiple ISPs connect?
[ "Where do multiple ISPs connect? " ]
{ "text": [ "peering points or Internet exchange points" ], "answer_start": [ 64 ] }
gem-squad_v2-train-18063
5a10e82f06e79900185c3465
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
Who may not engage in peering?
Who may not engage in peering?
[ "Who may not engage in peering?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18064
5a10e82f06e79900185c3466
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
Different networks charge each other for what?
Different networks charge each other for what?
[ "Different networks charge each other for what?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18065
5a10e82f06e79900185c3467
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
What would've been incurred by data passing through a third upstream ISP?
What would've been incurred by data passing through a third upstream ISP?
[ "What would've been incurred by data passing through a third upstream ISP?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18066
5a10e82f06e79900185c3468
Internet_service_provider
ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP.
Nothing to what costs ISPs more money?
Nothing to what costs ISPs more money?
[ "Nothing to what costs ISPs more money?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18067
56dfc4e0231d4119001abdd8
Internet_service_provider
Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed]
Is a tradeoff between efficiency and cost possible?
Is a tradeoff between efficiency and cost possible?
[ "Is a tradeoff between efficiency and cost possible? " ]
{ "text": [ "A tradeoff between cost and efficiency is possible" ], "answer_start": [ 214 ] }
gem-squad_v2-train-18068
56dfc4e0231d4119001abdd9
Internet_service_provider
Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed]
What sort of route does data follow?
What sort of route does data follow?
[ "What sort of route does data follow? " ]
{ "text": [ "the most efficient route" ], "answer_start": [ 148 ] }
gem-squad_v2-train-18069
5a10e91306e79900185c346d
Internet_service_provider
Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed]
What trade-off is not possible?
What trade-off is not possible?
[ "What trade-off is not possible?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18070
5a10e91306e79900185c346e
Internet_service_provider
Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed]
What follows most inefficient route?
What follows most inefficient route?
[ "What follows most inefficient route?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18071
5a10e91306e79900185c346f
Internet_service_provider
Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed]
What works unreliably?
What works unreliably?
[ "What works unreliably?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18072
5a10e91306e79900185c3470
Internet_service_provider
Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed]
What ensures upstream connections are not reliable?
What ensures upstream connections are not reliable?
[ "What ensures upstream connections are not reliable?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18073
56dfc592231d4119001abddd
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What are ISPs subject to monitoring by in some countries?
What are ISPs subject to monitoring by in some countries?
[ "What are ISPs subject to monitoring by in some countries? " ]
{ "text": [ "intelligence agencies" ], "answer_start": [ 313 ] }
gem-squad_v2-train-18074
56dfc592231d4119001abdde
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What is the controversial N.S.A. program used in the U.S.?
What is the controversial N.S.A. program used in the U.S.?
[ "What is the controversial N.S.A. program used in the U.S.?" ]
{ "text": [ "PRISM" ], "answer_start": [ 407 ] }
gem-squad_v2-train-18075
56dfc592231d4119001abddf
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What does PRISM do?
What does PRISM do?
[ "What does PRISM do? " ]
{ "text": [ "provides for broad monitoring of Internet users traffic" ], "answer_start": [ 413 ] }
gem-squad_v2-train-18076
56dfc592231d4119001abde0
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What do ISPs integrate into their network to provide information to intelligence agencies?
What do ISPs integrate into their network to provide information to intelligence agencies?
[ "What do ISPs integrate into their network to provide information to intelligence agencies? " ]
{ "text": [ "a wide array of surveillance and packet sniffing equipment" ], "answer_start": [ 627 ] }
gem-squad_v2-train-18077
56dfc592231d4119001abde1
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What do DCSnet in the US and SORM in Russia do?
What do DCSnet in the US and SORM in Russia do?
[ "What do DCSnet in the US and SORM in Russia do? " ]
{ "text": [ "allowing monitoring of Internet traffic in real time" ], "answer_start": [ 831 ] }
gem-squad_v2-train-18078
5a10eb6d06e79900185c3475
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What are ISPs not legally required to do?
What are ISPs not legally required to do?
[ "What are ISPs not legally required to do?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18079
5a10eb6d06e79900185c3476
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What this PRISM stopped the national security agency for doing?
What this PRISM stopped the national security agency for doing?
[ "What this PRISM stopped the national security agency for doing?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18080
5a10eb6d06e79900185c3477
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
Who objects to PRISM
Who objects to PRISM
[ "Who objects to PRISM" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18081
5a10eb6d06e79900185c3478
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What do ISPs remove from their networks to discourage intelligence agencies?
What do ISPs remove from their networks to discourage intelligence agencies?
[ "What do ISPs remove from their networks to discourage intelligence agencies?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18082
5a10eb6d06e79900185c3479
Internet_service_provider
Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time.
What do many people say violates the First Amendment?
What do many people say violates the First Amendment?
[ "What do many people say violates the First Amendment?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18083
570dabef16d0071400510c8f
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
Where in Eritrea did Italian scientists find one of the oldest hominids?
Where in Eritrea did Italian scientists find one of the oldest hominids?
[ "Where in Eritrea did Italian scientists find one of the oldest hominids?" ]
{ "text": [ "Buya" ], "answer_start": [ 3 ] }
gem-squad_v2-train-18084
570dabef16d0071400510c90
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
How old was the hominid that was found in Eritrea?
How old was the hominid that was found in Eritrea?
[ "How old was the hominid that was found in Eritrea?" ]
{ "text": [ "over 1 million years" ], "answer_start": [ 167 ] }
gem-squad_v2-train-18085
570dabef16d0071400510c91
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
What place in Eritrea is believed to have played a major part in human evolution?
What place in Eritrea is believed to have played a major part in human evolution?
[ "What place in Eritrea is believed to have played a major part in human evolution?" ]
{ "text": [ "section of the Danakil Depression" ], "answer_start": [ 342 ] }
gem-squad_v2-train-18086
570dabef16d0071400510c92
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
What possible link is represented by the hominid found in Eritrea?
What possible link is represented by the hominid found in Eritrea?
[ "What possible link is represented by the hominid found in Eritrea?" ]
{ "text": [ "hominids and the earliest anatomically modern humans" ], "answer_start": [ 264 ] }
gem-squad_v2-train-18087
570dabef16d0071400510c93
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
What is the importance pertaining to the age of the hominid that was found in Eritrea?
What is the importance pertaining to the age of the hominid that was found in Eritrea?
[ "What is the importance pertaining to the age of the hominid that was found in Eritrea?" ]
{ "text": [ "it is the oldest skeletal find of its kind" ], "answer_start": [ 193 ] }
gem-squad_v2-train-18088
5ad0a8a5645df0001a2cffd0
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
What did German scientists find in Eritrea?
What did German scientists find in Eritrea?
[ "What did German scientists find in Eritrea?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18089
5ad0a8a5645df0001a2cffd1
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
How old was the newest archaic Homo sapiens skeleton found in Eretria?
How old was the newest archaic Homo sapiens skeleton found in Eretria?
[ "How old was the newest archaic Homo sapiens skeleton found in Eretria?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18090
5ad0a8a5645df0001a2cffd2
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
Where in Eritrea is it believed that no traces of evolution to anatomically modern humans will ever be found?
Where in Eritrea is it believed that no traces of evolution to anatomically modern humans will ever be found?
[ "Where in Eritrea is it believed that no traces of evolution to anatomically modern humans will ever be found?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18091
5ad0a8a5645df0001a2cffd3
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
How far back can anatomically modern human bones be found?
How far back can anatomically modern human bones be found?
[ "How far back can anatomically modern human bones be found?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18092
5ad0a8a5645df0001a2cffd4
Eritrea
At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans.
How far back do scientists think archaic Homo sapiens transitioned to anatomically modern humans?
How far back do scientists think archaic Homo sapiens transitioned to anatomically modern humans?
[ "How far back do scientists think archaic Homo sapiens transitioned to anatomically modern humans?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18093
570dacc916d0071400510ca3
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
Who was James Bruce?
Who was James Bruce?
[ "Who was James Bruce?" ]
{ "text": [ "Scottish traveler" ], "answer_start": [ 4 ] }
gem-squad_v2-train-18094
570dacc916d0071400510ca4
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
In 1770, who reported that Medri Bahri was a distinct political entity from Abyssinia?
In 1770, who reported that Medri Bahri was a distinct political entity from Abyssinia?
[ "In 1770, who reported that Medri Bahri was a distinct political entity from Abyssinia?" ]
{ "text": [ "James Bruce" ], "answer_start": [ 22 ] }
gem-squad_v2-train-18095
570dacc916d0071400510ca5
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
How is The Bahre-Nagassi translated?
How is The Bahre-Nagassi translated?
[ "How is The Bahre-Nagassi translated?" ]
{ "text": [ "\"Kings of the Sea\"" ], "answer_start": [ 196 ] }
gem-squad_v2-train-18096
570dacc916d0071400510ca6
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
What determined whether The Bahre-Nagassi fought with or against the Abyssinians?
What determined whether The Bahre-Nagassi fought with or against the Abyssinians?
[ "What determined whether The Bahre-Nagassi fought with or against the Abyssinians?" ]
{ "text": [ "geopolitical circumstances" ], "answer_start": [ 327 ] }
gem-squad_v2-train-18097
570dacc916d0071400510ca7
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
Which century marked the arrival of the Ottomans?
Which century marked the arrival of the Ottomans?
[ "Which century marked the arrival of the Ottomans?" ]
{ "text": [ "16th" ], "answer_start": [ 564 ] }
gem-squad_v2-train-18098
5ad0b2a0645df0001a2d00ac
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
Where did the Ottomans come from?
Where did the Ottomans come from?
[ "Where did the Ottomans come from?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-18099
5ad0b2a0645df0001a2d00ad
Eritrea
The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area.
When was James Bruce born?
When was James Bruce born?
[ "When was James Bruce born?" ]
{ "text": [], "answer_start": [] }