gem_id stringlengths 20 25 | id stringlengths 24 24 | title stringlengths 3 59 | context stringlengths 151 3.71k | question stringlengths 1 270 | target stringlengths 1 270 | references list | answers dict |
|---|---|---|---|---|---|---|---|
gem-squad_v2-train-18000 | 5a10dac206e79900185c3427 | Internet_service_provider | A mailbox provider is an organization that provides services for hosting electronic mail domains with access to storage for mail boxes. It provides email servers to send, receive, accept, and store email for end users or other organizations. | Who allows people to send but not accept in-store mail? | Who allows people to send but not accept in-store mail? | [
"Who allows people to send but not accept in-store mail?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18001 | 5a10dac206e79900185c3428 | Internet_service_provider | A mailbox provider is an organization that provides services for hosting electronic mail domains with access to storage for mail boxes. It provides email servers to send, receive, accept, and store email for end users or other organizations. | Who invented male domains? | Who invented male domains? | [
"Who invented male domains?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18002 | 56dfbf91231d4119001abd83 | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | What is SMTP? | What is SMTP? | [
"What is SMTP?"
] | {
"text": [
"Simple Mail Transfer Protocol"
],
"answer_start": [
390
]
} |
gem-squad_v2-train-18003 | 56dfbf91231d4119001abd84 | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | What is IMAP? | What is IMAP? | [
"What is IMAP?"
] | {
"text": [
"Internet Message Access Protocol"
],
"answer_start": [
477
]
} |
gem-squad_v2-train-18004 | 56dfbf91231d4119001abd85 | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | How is access to mail provided? | How is access to mail provided? | [
"How is access to mail provided? "
] | {
"text": [
"implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol."
],
"answer_start": [
377
]
} |
gem-squad_v2-train-18005 | 56dfbf91231d4119001abd86 | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | what are most mailbox providers as well? | what are most mailbox providers as well? | [
"what are most mailbox providers as well? "
] | {
"text": [
"access providers"
],
"answer_start": [
32
]
} |
gem-squad_v2-train-18006 | 56dfbf91231d4119001abd87 | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | who possibly controls their own mail servers? | who possibly controls their own mail servers? | [
"who possibly controls their own mail servers? "
] | {
"text": [
"companies, universities, organizations, groups, and individuals"
],
"answer_start": [
232
]
} |
gem-squad_v2-train-18007 | 5a10dce006e79900185c342d | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | All mailbox providers were also what? | All mailbox providers were also what? | [
"All mailbox providers were also what?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18008 | 5a10dce006e79900185c342e | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | What are examples of access providers? | What are examples of access providers? | [
"What are examples of access providers?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18009 | 5a10dce006e79900185c342f | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | What is used by organizations that depend on others to provide mail services? | What is used by organizations that depend on others to provide mail services? | [
"What is used by organizations that depend on others to provide mail services?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18010 | 5a10dce006e79900185c3430 | Internet_service_provider | Many mailbox providers are also access providers, while others are not (e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in RFC 6650 covers email hosting services, as well as the relevant department of companies, universities, organizations, groups, and individuals that manage their mail servers themselves. The task is typically accomplished by implementing Simple Mail Transfer Protocol (SMTP) and possibly providing access to messages through Internet Message Access Protocol (IMAP), the Post Office Protocol, Webmail, or a proprietary protocol. | How is traditional male provided? | How is traditional male provided? | [
"How is traditional male provided?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18011 | 56dfc016231d4119001abd8d | Internet_service_provider | Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation. | What do internet hosting services provide? | What do internet hosting services provide? | [
"What do internet hosting services provide? "
] | {
"text": [
"email, web-hosting, or online storage services"
],
"answer_start": [
34
]
} |
gem-squad_v2-train-18012 | 56dfc016231d4119001abd8e | Internet_service_provider | Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation. | Who provides a virtual server service? | Who provides a virtual server service? | [
"Who provides a virtual server service?"
] | {
"text": [
"Internet hosting services"
],
"answer_start": [
0
]
} |
gem-squad_v2-train-18013 | 56dfc016231d4119001abd8f | Internet_service_provider | Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation. | who provides cloud services? | who provides cloud services? | [
"who provides cloud services?"
] | {
"text": [
"Internet hosting services"
],
"answer_start": [
0
]
} |
gem-squad_v2-train-18014 | 5a10dd9906e79900185c3435 | Internet_service_provider | Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation. | Internet hosting protocols provide what? | Internet hosting protocols provide what? | [
"Internet hosting protocols provide what?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18015 | 5a10dd9906e79900185c3436 | Internet_service_provider | Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation. | Who provides physical servers to customers | Who provides physical servers to customers | [
"Who provides physical servers to customers"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18016 | 5a10dd9906e79900185c3437 | Internet_service_provider | Internet hosting services provide email, web-hosting, or online storage services. Other services include virtual server, cloud services, or physical server operation. | Who provides off-line storage services | Who provides off-line storage services | [
"Who provides off-line storage services"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18017 | 56dfc0ae231d4119001abd95 | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | Who does an ISP pay for internet access? | Who does an ISP pay for internet access? | [
"Who does an ISP pay for internet access?"
] | {
"text": [
"upstream ISPs"
],
"answer_start": [
74
]
} |
gem-squad_v2-train-18018 | 56dfc0ae231d4119001abd96 | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | Why does an ISP need to pay an upstream ISP? | Why does an ISP need to pay an upstream ISP? | [
"Why does an ISP need to pay an upstream ISP?"
] | {
"text": [
"An upstream ISP usually has a larger network than the contracting ISP"
],
"answer_start": [
109
]
} |
gem-squad_v2-train-18019 | 56dfc0ae231d4119001abd97 | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | What does an upstream ISP provide for an ISP? | What does an upstream ISP provide for an ISP? | [
"What does an upstream ISP provide for an ISP?"
] | {
"text": [
"access to parts of the Internet the contracting ISP by itself has no access to"
],
"answer_start": [
226
]
} |
gem-squad_v2-train-18020 | 56dfc0ae231d4119001abd99 | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | what usually has a larger network, the ISP of the customer or the upstream ISP? | what usually has a larger network, the ISP of the customer or the upstream ISP? | [
"what usually has a larger network, the ISP of the customer or the upstream ISP?"
] | {
"text": [
"upstream ISPs"
],
"answer_start": [
74
]
} |
gem-squad_v2-train-18021 | 5a10dee906e79900185c343b | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | What do ISPs pay customers for? | What do ISPs pay customers for? | [
"What do ISPs pay customers for?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18022 | 5a10dee906e79900185c343c | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | What usually has a small network than a contracting ISP? | What usually has a small network than a contracting ISP? | [
"What usually has a small network than a contracting ISP?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18023 | 5a10dee906e79900185c343d | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | What does an upstream ISP provide for customers? | What does an upstream ISP provide for customers? | [
"What does an upstream ISP provide for customers?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18024 | 5a10dee906e79900185c343e | Internet_service_provider | Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. | What does the contracting ISP have access to that the upstream ISP does not? | What does the contracting ISP have access to that the upstream ISP does not? | [
"What does the contracting ISP have access to that the upstream ISP does not?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18025 | 56dfc22f7aa994140058e13f | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | What is the simplest case of an ISP using an upstream ISP? | What is the simplest case of an ISP using an upstream ISP? | [
"What is the simplest case of an ISP using an upstream ISP? "
] | {
"text": [
"transmit data to or from areas of the Internet beyond the home network"
],
"answer_start": [
91
]
} |
gem-squad_v2-train-18026 | 56dfc22f7aa994140058e140 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | what do transit ISPs provide? | what do transit ISPs provide? | [
"what do transit ISPs provide? "
] | {
"text": [
"large amounts of bandwidth for connecting hosting ISPs and access ISPs"
],
"answer_start": [
573
]
} |
gem-squad_v2-train-18027 | 56dfc22f7aa994140058e141 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | A mode of interconnection is often cascaded multiple times until reaching what? | A mode of interconnection is often cascaded multiple times until reaching what? | [
"A mode of interconnection is often cascaded multiple times until reaching what?"
] | {
"text": [
"a tier 1 carrier"
],
"answer_start": [
240
]
} |
gem-squad_v2-train-18028 | 56dfc22f7aa994140058e142 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | What is a PoP? | What is a PoP? | [
"What is a PoP?"
] | {
"text": [
"point of presence"
],
"answer_start": [
331
]
} |
gem-squad_v2-train-18029 | 56dfc22f7aa994140058e143 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | What provides bandwidth for the connecting of hosting ISPs and access ISPs? | What provides bandwidth for the connecting of hosting ISPs and access ISPs? | [
"What provides bandwidth for the connecting of hosting ISPs and access ISPs?"
] | {
"text": [
"Transit ISPs"
],
"answer_start": [
552
]
} |
gem-squad_v2-train-18030 | 5a10e0bf06e79900185c3443 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | Who provides minimal amounts of bandwidth for connecting ISPs? | Who provides minimal amounts of bandwidth for connecting ISPs? | [
"Who provides minimal amounts of bandwidth for connecting ISPs?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18031 | 5a10e0bf06e79900185c3444 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | What is a point of protocol abbreviated as? | What is a point of protocol abbreviated as? | [
"What is a point of protocol abbreviated as?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18032 | 5a10e0bf06e79900185c3445 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | What has the same connection to an upstream ISP? | What has the same connection to an upstream ISP? | [
"What has the same connection to an upstream ISP?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18033 | 5a10e0bf06e79900185c3446 | Internet_service_provider | In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs and access ISPs. | What transmits Internet within the home? | What transmits Internet within the home? | [
"What transmits Internet within the home?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18034 | 56dfc2de231d4119001abdaf | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | What is a VISP? | What is a VISP? | [
"What is a VISP?"
] | {
"text": [
"virtual ISP"
],
"answer_start": [
2
]
} |
gem-squad_v2-train-18035 | 56dfc2de231d4119001abdb1 | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | What do VISPs resemble? | What do VISPs resemble? | [
"What do VISPs resemble? "
] | {
"text": [
"mobile virtual network operators"
],
"answer_start": [
275
]
} |
gem-squad_v2-train-18036 | 56dfc2de231d4119001abdb2 | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | What do visps purchase services from? | What do visps purchase services from? | [
"What do visps purchase services from? "
] | {
"text": [
"a wholesale ISP"
],
"answer_start": [
96
]
} |
gem-squad_v2-train-18037 | 5a10e2b206e79900185c344b | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | Who does an ISP purchase services from? | Who does an ISP purchase services from? | [
"Who does an ISP purchase services from?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18038 | 5a10e2b206e79900185c344c | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | Who do wholesale ISP purchased services from? | Who do wholesale ISP purchased services from? | [
"Who do wholesale ISP purchased services from?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18039 | 5a10e2b206e79900185c344d | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | What do virtual network operators resemble? | What do virtual network operators resemble? | [
"What do virtual network operators resemble?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18040 | 5a10e2b206e79900185c344e | Internet_service_provider | A virtual ISP (VISP) is an operation that purchases services from another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's customers to access the Internet using services and infrastructure owned and operated by the wholesale ISP. VISPs resemble mobile virtual network operators and competitive local exchange carriers for voice communications. | How do VISP's customers access the Internet? | How do VISP's customers access the Internet? | [
"How do VISP's customers access the Internet?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18041 | 56dfc3487aa994140058e167 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | What are free ISPs? | What are free ISPs? | [
"What are free ISPs?"
] | {
"text": [
"Internet service providers that provide service free of charge"
],
"answer_start": [
14
]
} |
gem-squad_v2-train-18042 | 56dfc3487aa994140058e168 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | What do free ISPs display in exchange for service? | What do free ISPs display in exchange for service? | [
"What do free ISPs display in exchange for service?"
] | {
"text": [
"advertisements"
],
"answer_start": [
101
]
} |
gem-squad_v2-train-18043 | 56dfc3487aa994140058e169 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | What are free ISPs similar to? | What are free ISPs similar to? | [
"What are free ISPs similar to? "
] | {
"text": [
"commercial television"
],
"answer_start": [
150
]
} |
gem-squad_v2-train-18044 | 56dfc3487aa994140058e16b | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | How are freenets run? | How are freenets run? | [
"How are freenets run? "
] | {
"text": [
"on a nonprofit basis"
],
"answer_start": [
293
]
} |
gem-squad_v2-train-18045 | 5a10e3cc06e79900185c3453 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | What type of ISPs are free of restrictions? | What type of ISPs are free of restrictions? | [
"What type of ISPs are free of restrictions?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18046 | 5a10e3cc06e79900185c3454 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | Who accepts donations instead of charging for services? | Who accepts donations instead of charging for services? | [
"Who accepts donations instead of charging for services?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18047 | 5a10e3cc06e79900185c3455 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | What kind of television are free ISPs like? | What kind of television are free ISPs like? | [
"What kind of television are free ISPs like?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18048 | 5a10e3cc06e79900185c3456 | Internet_service_provider | Free ISPs are Internet service providers that provide service free of charge. Many free ISPs display advertisements while the user is connected; like commercial television, in a sense they are selling the user's attention to the advertiser. Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with volunteer staff.[citation needed] | What are for-profit ISPs called? | What are for-profit ISPs called? | [
"What are for-profit ISPs called?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18049 | 56dfc3c77aa994140058e171 | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What is a WISP? | What is a WISP? | [
"What is a WISP? "
] | {
"text": [
"wireless Internet service provider"
],
"answer_start": [
2
]
} |
gem-squad_v2-train-18050 | 56dfc3c77aa994140058e172 | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What technology is part of a WISP? | What technology is part of a WISP? | [
"What technology is part of a WISP?"
] | {
"text": [
"commonplace Wi-Fi wireless mesh networking, or proprietary equipment"
],
"answer_start": [
144
]
} |
gem-squad_v2-train-18051 | 56dfc3c77aa994140058e173 | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What are some bands that Wi-Fi can operate over? | What are some bands that Wi-Fi can operate over? | [
"What are some bands that Wi-Fi can operate over? "
] | {
"text": [
"900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands"
],
"answer_start": [
243
]
} |
gem-squad_v2-train-18052 | 56dfc3c77aa994140058e174 | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What is a wireless internet service provider's network based on? | What is a wireless internet service provider's network based on? | [
"What is a wireless internet service provider's network based on?"
] | {
"text": [
"wireless networking"
],
"answer_start": [
100
]
} |
gem-squad_v2-train-18053 | 5a10e4ae06e79900185c345b | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What is a wired Internet service provider? | What is a wired Internet service provider? | [
"What is a wired Internet service provider?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18054 | 5a10e4ae06e79900185c345c | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What kind of uncommon networking is used for WISPs | What kind of uncommon networking is used for WISPs | [
"What kind of uncommon networking is used for WISPs"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18055 | 5a10e4ae06e79900185c345d | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What operates unlicensed frequencies? | What operates unlicensed frequencies? | [
"What operates unlicensed frequencies?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18056 | 5a10e4ae06e79900185c345e | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | What is designed to operate under open 900 MHz | What is designed to operate under open 900 MHz | [
"What is designed to operate under open 900 MHz"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18057 | 5a10e4ae06e79900185c345f | Internet_service_provider | A wireless Internet service provider (WISP) is an Internet service provider with a network based on wireless networking. Technology may include commonplace Wi-Fi wireless mesh networking, or proprietary equipment designed to operate over open 900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS frequency band) and LMDS.[citation needed] | W ISP do not operate in what band? | W ISP do not operate in what band? | [
"W ISP do not operate in what band?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18058 | 56dfc460231d4119001abdc3 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | What is peering? | What is peering? | [
"What is peering? "
] | {
"text": [
"multiple ISPs interconnect at peering points or Internet exchange points"
],
"answer_start": [
34
]
} |
gem-squad_v2-train-18059 | 56dfc460231d4119001abdc4 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | What does peering allow? | What does peering allow? | [
"What does peering allow? "
] | {
"text": [
"routing of data between each network, without charging one another for the data transmitted"
],
"answer_start": [
123
]
} |
gem-squad_v2-train-18060 | 56dfc460231d4119001abdc5 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | Why is peering used? | Why is peering used? | [
"Why is peering used? "
] | {
"text": [
"data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP"
],
"answer_start": [
215
]
} |
gem-squad_v2-train-18061 | 56dfc460231d4119001abdc6 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | What are IXs? | What are IXs? | [
"What are IXs? "
] | {
"text": [
"Internet exchange points"
],
"answer_start": [
82
]
} |
gem-squad_v2-train-18062 | 56dfc460231d4119001abdc7 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | Where do multiple ISPs connect? | Where do multiple ISPs connect? | [
"Where do multiple ISPs connect? "
] | {
"text": [
"peering points or Internet exchange points"
],
"answer_start": [
64
]
} |
gem-squad_v2-train-18063 | 5a10e82f06e79900185c3465 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | Who may not engage in peering? | Who may not engage in peering? | [
"Who may not engage in peering?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18064 | 5a10e82f06e79900185c3466 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | Different networks charge each other for what? | Different networks charge each other for what? | [
"Different networks charge each other for what?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18065 | 5a10e82f06e79900185c3467 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | What would've been incurred by data passing through a third upstream ISP? | What would've been incurred by data passing through a third upstream ISP? | [
"What would've been incurred by data passing through a third upstream ISP?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18066 | 5a10e82f06e79900185c3468 | Internet_service_provider | ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted—data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. | Nothing to what costs ISPs more money? | Nothing to what costs ISPs more money? | [
"Nothing to what costs ISPs more money?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18067 | 56dfc4e0231d4119001abdd8 | Internet_service_provider | Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed] | Is a tradeoff between efficiency and cost possible? | Is a tradeoff between efficiency and cost possible? | [
"Is a tradeoff between efficiency and cost possible? "
] | {
"text": [
"A tradeoff between cost and efficiency is possible"
],
"answer_start": [
214
]
} |
gem-squad_v2-train-18068 | 56dfc4e0231d4119001abdd9 | Internet_service_provider | Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed] | What sort of route does data follow? | What sort of route does data follow? | [
"What sort of route does data follow? "
] | {
"text": [
"the most efficient route"
],
"answer_start": [
148
]
} |
gem-squad_v2-train-18069 | 5a10e91306e79900185c346d | Internet_service_provider | Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed] | What trade-off is not possible? | What trade-off is not possible? | [
"What trade-off is not possible?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18070 | 5a10e91306e79900185c346e | Internet_service_provider | Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed] | What follows most inefficient route? | What follows most inefficient route? | [
"What follows most inefficient route?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18071 | 5a10e91306e79900185c346f | Internet_service_provider | Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed] | What works unreliably? | What works unreliably? | [
"What works unreliably?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18072 | 5a10e91306e79900185c3470 | Internet_service_provider | Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible.[citation needed] | What ensures upstream connections are not reliable? | What ensures upstream connections are not reliable? | [
"What ensures upstream connections are not reliable?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18073 | 56dfc592231d4119001abddd | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What are ISPs subject to monitoring by in some countries? | What are ISPs subject to monitoring by in some countries? | [
"What are ISPs subject to monitoring by in some countries? "
] | {
"text": [
"intelligence agencies"
],
"answer_start": [
313
]
} |
gem-squad_v2-train-18074 | 56dfc592231d4119001abdde | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What is the controversial N.S.A. program used in the U.S.? | What is the controversial N.S.A. program used in the U.S.? | [
"What is the controversial N.S.A. program used in the U.S.?"
] | {
"text": [
"PRISM"
],
"answer_start": [
407
]
} |
gem-squad_v2-train-18075 | 56dfc592231d4119001abddf | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What does PRISM do? | What does PRISM do? | [
"What does PRISM do? "
] | {
"text": [
"provides for broad monitoring of Internet users traffic"
],
"answer_start": [
413
]
} |
gem-squad_v2-train-18076 | 56dfc592231d4119001abde0 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What do ISPs integrate into their network to provide information to intelligence agencies? | What do ISPs integrate into their network to provide information to intelligence agencies? | [
"What do ISPs integrate into their network to provide information to intelligence agencies? "
] | {
"text": [
"a wide array of surveillance and packet sniffing equipment"
],
"answer_start": [
627
]
} |
gem-squad_v2-train-18077 | 56dfc592231d4119001abde1 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What do DCSnet in the US and SORM in Russia do? | What do DCSnet in the US and SORM in Russia do? | [
"What do DCSnet in the US and SORM in Russia do? "
] | {
"text": [
"allowing monitoring of Internet traffic in real time"
],
"answer_start": [
831
]
} |
gem-squad_v2-train-18078 | 5a10eb6d06e79900185c3475 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What are ISPs not legally required to do? | What are ISPs not legally required to do? | [
"What are ISPs not legally required to do?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18079 | 5a10eb6d06e79900185c3476 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What this PRISM stopped the national security agency for doing? | What this PRISM stopped the national security agency for doing? | [
"What this PRISM stopped the national security agency for doing?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18080 | 5a10eb6d06e79900185c3477 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | Who objects to PRISM | Who objects to PRISM | [
"Who objects to PRISM"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18081 | 5a10eb6d06e79900185c3478 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What do ISPs remove from their networks to discourage intelligence agencies? | What do ISPs remove from their networks to discourage intelligence agencies? | [
"What do ISPs remove from their networks to discourage intelligence agencies?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18082 | 5a10eb6d06e79900185c3479 | Internet_service_provider | Internet service providers in many countries are legally required (e.g., via Communications Assistance for Law Enforcement Act (CALEA) in the U.S.) to allow law enforcement agencies to monitor some or all of the information transmitted by the ISP. Furthermore, in some countries ISPs are subject to monitoring by intelligence agencies. In the U.S., a controversial National Security Agency program known as PRISM provides for broad monitoring of Internet users traffic and has raised concerns about potential violation of the privacy protections in the Fourth Amendment to the United States Constitution. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks (such as DCSNet in the United States, or SORM in Russia) allowing monitoring of Internet traffic in real time. | What do many people say violates the First Amendment? | What do many people say violates the First Amendment? | [
"What do many people say violates the First Amendment?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18083 | 570dabef16d0071400510c8f | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | Where in Eritrea did Italian scientists find one of the oldest hominids? | Where in Eritrea did Italian scientists find one of the oldest hominids? | [
"Where in Eritrea did Italian scientists find one of the oldest hominids?"
] | {
"text": [
"Buya"
],
"answer_start": [
3
]
} |
gem-squad_v2-train-18084 | 570dabef16d0071400510c90 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | How old was the hominid that was found in Eritrea? | How old was the hominid that was found in Eritrea? | [
"How old was the hominid that was found in Eritrea?"
] | {
"text": [
"over 1 million years"
],
"answer_start": [
167
]
} |
gem-squad_v2-train-18085 | 570dabef16d0071400510c91 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | What place in Eritrea is believed to have played a major part in human evolution? | What place in Eritrea is believed to have played a major part in human evolution? | [
"What place in Eritrea is believed to have played a major part in human evolution?"
] | {
"text": [
"section of the Danakil Depression"
],
"answer_start": [
342
]
} |
gem-squad_v2-train-18086 | 570dabef16d0071400510c92 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | What possible link is represented by the hominid found in Eritrea? | What possible link is represented by the hominid found in Eritrea? | [
"What possible link is represented by the hominid found in Eritrea?"
] | {
"text": [
"hominids and the earliest anatomically modern humans"
],
"answer_start": [
264
]
} |
gem-squad_v2-train-18087 | 570dabef16d0071400510c93 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | What is the importance pertaining to the age of the hominid that was found in Eritrea? | What is the importance pertaining to the age of the hominid that was found in Eritrea? | [
"What is the importance pertaining to the age of the hominid that was found in Eritrea?"
] | {
"text": [
"it is the oldest skeletal find of its kind"
],
"answer_start": [
193
]
} |
gem-squad_v2-train-18088 | 5ad0a8a5645df0001a2cffd0 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | What did German scientists find in Eritrea? | What did German scientists find in Eritrea? | [
"What did German scientists find in Eritrea?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18089 | 5ad0a8a5645df0001a2cffd1 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | How old was the newest archaic Homo sapiens skeleton found in Eretria? | How old was the newest archaic Homo sapiens skeleton found in Eretria? | [
"How old was the newest archaic Homo sapiens skeleton found in Eretria?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18090 | 5ad0a8a5645df0001a2cffd2 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | Where in Eritrea is it believed that no traces of evolution to anatomically modern humans will ever be found? | Where in Eritrea is it believed that no traces of evolution to anatomically modern humans will ever be found? | [
"Where in Eritrea is it believed that no traces of evolution to anatomically modern humans will ever be found?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18091 | 5ad0a8a5645df0001a2cffd3 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | How far back can anatomically modern human bones be found? | How far back can anatomically modern human bones be found? | [
"How far back can anatomically modern human bones be found?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18092 | 5ad0a8a5645df0001a2cffd4 | Eritrea | At Buya in Eritrea, one of the oldest hominids representing a possible link between Homo erectus and an archaic Homo sapiens was found by Italian scientists. Dated to over 1 million years old, it is the oldest skeletal find of its kind and provides a link between hominids and the earliest anatomically modern humans. It is believed that the section of the Danakil Depression in Eritrea was also a major player in terms of human evolution, and may contain other traces of evolution from Homo erectus hominids to anatomically modern humans. | How far back do scientists think archaic Homo sapiens transitioned to anatomically modern humans? | How far back do scientists think archaic Homo sapiens transitioned to anatomically modern humans? | [
"How far back do scientists think archaic Homo sapiens transitioned to anatomically modern humans?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18093 | 570dacc916d0071400510ca3 | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | Who was James Bruce? | Who was James Bruce? | [
"Who was James Bruce?"
] | {
"text": [
"Scottish traveler"
],
"answer_start": [
4
]
} |
gem-squad_v2-train-18094 | 570dacc916d0071400510ca4 | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | In 1770, who reported that Medri Bahri was a distinct political entity from Abyssinia? | In 1770, who reported that Medri Bahri was a distinct political entity from Abyssinia? | [
"In 1770, who reported that Medri Bahri was a distinct political entity from Abyssinia?"
] | {
"text": [
"James Bruce"
],
"answer_start": [
22
]
} |
gem-squad_v2-train-18095 | 570dacc916d0071400510ca5 | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | How is The Bahre-Nagassi translated? | How is The Bahre-Nagassi translated? | [
"How is The Bahre-Nagassi translated?"
] | {
"text": [
"\"Kings of the Sea\""
],
"answer_start": [
196
]
} |
gem-squad_v2-train-18096 | 570dacc916d0071400510ca6 | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | What determined whether The Bahre-Nagassi fought with or against the Abyssinians? | What determined whether The Bahre-Nagassi fought with or against the Abyssinians? | [
"What determined whether The Bahre-Nagassi fought with or against the Abyssinians?"
] | {
"text": [
"geopolitical circumstances"
],
"answer_start": [
327
]
} |
gem-squad_v2-train-18097 | 570dacc916d0071400510ca7 | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | Which century marked the arrival of the Ottomans? | Which century marked the arrival of the Ottomans? | [
"Which century marked the arrival of the Ottomans?"
] | {
"text": [
"16th"
],
"answer_start": [
564
]
} |
gem-squad_v2-train-18098 | 5ad0b2a0645df0001a2d00ac | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | Where did the Ottomans come from? | Where did the Ottomans come from? | [
"Where did the Ottomans come from?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-18099 | 5ad0b2a0645df0001a2d00ad | Eritrea | The Scottish traveler James Bruce reported in 1770 that Medri Bahri was a distinct political entity from Abyssinia, noting that the two territories were frequently in conflict. The Bahre-Nagassi ("Kings of the Sea") alternately fought with or against the Abyssinians and the neighbouring Muslim Adal Sultanate depending on the geopolitical circumstances. Medri Bahri was thus part of the Christian resistance against Imam Ahmad ibn Ibrahim al-Ghazi of Adal's forces, but later joined the Adalite states and the Ottoman Empire front against Abyssinia in 1572. That 16th century also marked the arrival of the Ottomans, who began making inroads in the Red Sea area. | When was James Bruce born? | When was James Bruce born? | [
"When was James Bruce born?"
] | {
"text": [],
"answer_start": []
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.