gem_id stringlengths 20 25 | id stringlengths 24 24 | title stringlengths 3 59 | context stringlengths 151 3.71k | question stringlengths 1 270 | target stringlengths 1 270 | references list | answers dict |
|---|---|---|---|---|---|---|---|
gem-squad_v2-train-7600 | 572facde04bcaa1900d76bd2 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What is an important goal in in this final stage? | What is an important goal in in this final stage? | [
"What is an important goal in in this final stage?"
] | {
"text": [
"data independence"
],
"answer_start": [
211
]
} |
gem-squad_v2-train-7601 | 572facde04bcaa1900d76bd3 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What factor is reflected in performance requirements? | What factor is reflected in performance requirements? | [
"What factor is reflected in performance requirements?"
] | {
"text": [
"Physical design"
],
"answer_start": [
351
]
} |
gem-squad_v2-train-7602 | 5a8c8aacfd22b3001a8d8a64 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What decisions are optional in the last stage of database design? | What decisions are optional in the last stage of database design? | [
"What decisions are optional in the last stage of database design?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7603 | 5a8c8aacfd22b3001a8d8a65 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What is an irrelevant goal in the final stage? | What is an irrelevant goal in the final stage? | [
"What is an irrelevant goal in the final stage?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7604 | 5a8c8aacfd22b3001a8d8a66 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What factor is not reflected in performance requirements? | What factor is not reflected in performance requirements? | [
"What factor is not reflected in performance requirements?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7605 | 5a8c8aacfd22b3001a8d8a67 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What requires no knowledge of the expected workload? | What requires no knowledge of the expected workload? | [
"What requires no knowledge of the expected workload?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7606 | 5a8c8aacfd22b3001a8d8a68 | Database | The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS. | What is no longer a key goal during the final stage? | What is no longer a key goal during the final stage? | [
"What is no longer a key goal during the final stage?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7607 | 572fae08a23a5019007fc877 | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | How many conceptual or physical views of data are there? | How many conceptual or physical views of data are there? | [
"How many conceptual or physical views of data are there?"
] | {
"text": [
"one"
],
"answer_start": [
30
]
} |
gem-squad_v2-train-7608 | 572fae08a23a5019007fc878 | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | How many different external views of data are there? | How many different external views of data are there? | [
"How many different external views of data are there?"
] | {
"text": [
"any number"
],
"answer_start": [
116
]
} |
gem-squad_v2-train-7609 | 572fae08a23a5019007fc879 | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | What is the benefit of external views of data? | What is the benefit of external views of data? | [
"What is the benefit of external views of data?"
] | {
"text": [
"see database information in a more business-related way"
],
"answer_start": [
177
]
} |
gem-squad_v2-train-7610 | 5a8c8c1cfd22b3001a8d8a8c | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | How many conceptual or physical views of data do not exist? | How many conceptual or physical views of data do not exist? | [
"How many conceptual or physical views of data do not exist?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7611 | 5a8c8c1cfd22b3001a8d8a8d | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | How many duplicated external views of data are there? | How many duplicated external views of data are there? | [
"How many duplicated external views of data are there?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7612 | 5a8c8c1cfd22b3001a8d8a8e | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | What is the disadvantage of external views of data? | What is the disadvantage of external views of data? | [
"What is the disadvantage of external views of data?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7613 | 5a8c8c1cfd22b3001a8d8a8f | Database | While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database. | Who is not allowed to see database information? | Who is not allowed to see database information? | [
"Who is not allowed to see database information?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7614 | 572fafeca23a5019007fc89b | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | What does the conceptual view offer? | What does the conceptual view offer? | [
"What does the conceptual view offer?"
] | {
"text": [
"a level of indirection between internal and external"
],
"answer_start": [
29
]
} |
gem-squad_v2-train-7615 | 572fafeca23a5019007fc89c | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | How does the conceptual view handle how data is managed? | How does the conceptual view handle how data is managed? | [
"How does the conceptual view handle how data is managed?"
] | {
"text": [
"abstracts away details"
],
"answer_start": [
214
]
} |
gem-squad_v2-train-7616 | 572fafeca23a5019007fc89d | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | What type of view does the conceptual view offer? | What type of view does the conceptual view offer? | [
"What type of view does the conceptual view offer?"
] | {
"text": [
"common"
],
"answer_start": [
109
]
} |
gem-squad_v2-train-7617 | 5a8c8de2fd22b3001a8d8ac2 | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | What does the conceptual view ignore? | What does the conceptual view ignore? | [
"What does the conceptual view ignore?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7618 | 5a8c8de2fd22b3001a8d8ac3 | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | How does the conceptual view handle how data is erased? | How does the conceptual view handle how data is erased? | [
"How does the conceptual view handle how data is erased?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7619 | 5a8c8de2fd22b3001a8d8ac4 | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | What type of view does the conceptual view degrade? | What type of view does the conceptual view degrade? | [
"What type of view does the conceptual view degrade?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7620 | 5a8c8de2fd22b3001a8d8ac5 | Database | The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types. | What view can't be presented by a different data model? | What view can't be presented by a different data model? | [
"What view can't be presented by a different data model?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7621 | 572fb19f04bcaa1900d76bfb | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What is responsible for putting information into permanent storage? | What is responsible for putting information into permanent storage? | [
"What is responsible for putting information into permanent storage?"
] | {
"text": [
"database engine"
],
"answer_start": [
435
]
} |
gem-squad_v2-train-7622 | 572fb19f04bcaa1900d76bfc | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What is database storage? | What is database storage? | [
"What is database storage?"
] | {
"text": [
"physical materialization of a database"
],
"answer_start": [
41
]
} |
gem-squad_v2-train-7623 | 572fb19f04bcaa1900d76bfd | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What do database administrators closely monitor? | What do database administrators closely monitor? | [
"What do database administrators closely monitor?"
] | {
"text": [
"storage properties and configuration setting"
],
"answer_start": [
647
]
} |
gem-squad_v2-train-7624 | 572fb19f04bcaa1900d76bfe | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | While working, does DBMS store information in one place? | While working, does DBMS store information in one place? | [
"While working, does DBMS store information in one place?"
] | {
"text": [
"several types of storage"
],
"answer_start": [
881
]
} |
gem-squad_v2-train-7625 | 572fb19f04bcaa1900d76bff | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What are huge quantities of information stored as? | What are huge quantities of information stored as? | [
"What are huge quantities of information stored as?"
] | {
"text": [
"bits"
],
"answer_start": [
1047
]
} |
gem-squad_v2-train-7626 | 5a8c8e7dfd22b3001a8d8ad4 | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What is responsible for losing information in permanent storage? | What is responsible for losing information in permanent storage? | [
"What is responsible for losing information in permanent storage?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7627 | 5a8c8e7dfd22b3001a8d8ad5 | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What is no longer considered database storage? | What is no longer considered database storage? | [
"What is no longer considered database storage?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7628 | 5a8c8e7dfd22b3001a8d8ad6 | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What do database administrators loosely monitor? | What do database administrators loosely monitor? | [
"What do database administrators loosely monitor?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7629 | 5a8c8e7dfd22b3001a8d8ad7 | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | How many types of storage are not utilized for DBMS? | How many types of storage are not utilized for DBMS? | [
"How many types of storage are not utilized for DBMS?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7630 | 5a8c8e7dfd22b3001a8d8ad8 | Database | Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database). | What are no quantities of information stored as? | What are no quantities of information stored as? | [
"What are no quantities of information stored as?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7631 | 572fb248947a6a140053cba4 | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | What does database access limit? | What does database access limit? | [
"What does database access limit?"
] | {
"text": [
"who (a person or a certain computer program) is allowed to access what information"
],
"answer_start": [
47
]
} |
gem-squad_v2-train-7632 | 572fb248947a6a140053cba5 | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | What are examples of database objects? | What are examples of database objects? | [
"What are examples of database objects?"
] | {
"text": [
"record types, specific records, data structures"
],
"answer_start": [
209
]
} |
gem-squad_v2-train-7633 | 572fb248947a6a140053cba6 | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | Who sets database access? | Who sets database access? | [
"Who sets database access?"
] | {
"text": [
"special authorized (by the database owner) personnel"
],
"answer_start": [
507
]
} |
gem-squad_v2-train-7634 | 5a8c8f2afd22b3001a8d8afc | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | What does database access have no influence on? | What does database access have no influence on? | [
"What does database access have no influence on?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7635 | 5a8c8f2afd22b3001a8d8afd | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | What are examples of the only kind of database errors? | What are examples of the only kind of database errors? | [
"What are examples of the only kind of database errors?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7636 | 5a8c8f2afd22b3001a8d8afe | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | Who has no database access? | Who has no database access? | [
"Who has no database access?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7637 | 5a8c8f2afd22b3001a8d8aff | Database | Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces. | Who uses dedicated unprotected security DBMS interfaces? | Who uses dedicated unprotected security DBMS interfaces? | [
"Who uses dedicated unprotected security DBMS interfaces?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7638 | 572fb32704bcaa1900d76c05 | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | What does data security avoid? | What does data security avoid? | [
"What does data security avoid?"
] | {
"text": [
"unauthorized users from viewing or updating the database"
],
"answer_start": [
267
]
} |
gem-squad_v2-train-7639 | 572fb32704bcaa1900d76c06 | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | What is a subset of a database called that can be accessed by using a password? | What is a subset of a database called that can be accessed by using a password? | [
"What is a subset of a database called that can be accessed by using a password?"
] | {
"text": [
"subschemas"
],
"answer_start": [
415
]
} |
gem-squad_v2-train-7640 | 572fb32704bcaa1900d76c07 | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | What is possible when a DBMS interrogate and update a database? | What is possible when a DBMS interrogate and update a database? | [
"What is possible when a DBMS interrogate and update a database?"
] | {
"text": [
"managing personal databases"
],
"answer_start": [
785
]
} |
gem-squad_v2-train-7641 | 5a8c9049fd22b3001a8d8b0c | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | What does data security support? | What does data security support? | [
"What does data security support?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7642 | 5a8c9049fd22b3001a8d8b0d | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | What is a subset of a database called that can be accessed by using a spell? | What is a subset of a database called that can be accessed by using a spell? | [
"What is a subset of a database called that can be accessed by using a spell?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7643 | 5a8c9049fd22b3001a8d8b0e | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | What is possible when a DBMS corrupts a database? | What is possible when a DBMS corrupts a database? | [
"What is possible when a DBMS corrupts a database?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7644 | 5a8c9049fd22b3001a8d8b0f | Database | This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. | Who can view the entire contents of an employee database? | Who can view the entire contents of an employee database? | [
"Who can view the entire contents of an employee database?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7645 | 572fb513947a6a140053cbc4 | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | What is a unit of work called in a database? | What is a unit of work called in a database? | [
"What is a unit of work called in a database?"
] | {
"text": [
"transaction"
],
"answer_start": [
136
]
} |
gem-squad_v2-train-7646 | 572fb513947a6a140053cbc5 | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | How can database transactions ensure accuracy after a crash? | How can database transactions ensure accuracy after a crash? | [
"How can database transactions ensure accuracy after a crash?"
] | {
"text": [
"fault tolerance"
],
"answer_start": [
61
]
} |
gem-squad_v2-train-7647 | 572fb513947a6a140053cbc6 | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | Are transactions limited? | Are transactions limited? | [
"Are transactions limited?"
] | {
"text": [
"Each transaction has well defined boundaries"
],
"answer_start": [
357
]
} |
gem-squad_v2-train-7648 | 5a8c90e0fd22b3001a8d8b2e | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | What is a unit of play called in a database? | What is a unit of play called in a database? | [
"What is a unit of play called in a database?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7649 | 5a8c90e0fd22b3001a8d8b2f | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | How can database transactions lower accuracy after a crash? | How can database transactions lower accuracy after a crash? | [
"How can database transactions lower accuracy after a crash?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7650 | 5a8c90e0fd22b3001a8d8b30 | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | What has poorly defined boundaries in a database? | What has poorly defined boundaries in a database? | [
"What has poorly defined boundaries in a database?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7651 | 5a8c90e0fd22b3001a8d8b31 | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | What has no ability to recover from a crash? | What has no ability to recover from a crash? | [
"What has no ability to recover from a crash?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7652 | 5a8c90e0fd22b3001a8d8b32 | Database | Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands). | What always encapsulates only one transaction? | What always encapsulates only one transaction? | [
"What always encapsulates only one transaction?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7653 | 572fb6f904bcaa1900d76c27 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | Can a DBMS be transfered to a different DBMS? | Can a DBMS be transfered to a different DBMS? | [
"Can a DBMS be transfered to a different DBMS?"
] | {
"text": [
"ano"
],
"answer_start": [
50
]
} |
gem-squad_v2-train-7654 | 572fb6f904bcaa1900d76c28 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | Why would someone attempt to unite two different databases? | Why would someone attempt to unite two different databases? | [
"Why would someone attempt to unite two different databases?"
] | {
"text": [
"primarily economical"
],
"answer_start": [
215
]
} |
gem-squad_v2-train-7655 | 572fb6f904bcaa1900d76c29 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | In order to merge, what must the database maintain? | In order to merge, what must the database maintain? | [
"In order to merge, what must the database maintain?"
] | {
"text": [
"database related application"
],
"answer_start": [
523
]
} |
gem-squad_v2-train-7656 | 572fb6f904bcaa1900d76c2a | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | What are the important parts of the database related application that should be moved? | What are the important parts of the database related application that should be moved? | [
"What are the important parts of the database related application that should be moved?"
] | {
"text": [
"conceptual and external architectural levels"
],
"answer_start": [
622
]
} |
gem-squad_v2-train-7657 | 572fb6f904bcaa1900d76c2b | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | How can a DBMS database migration be made easier? | How can a DBMS database migration be made easier? | [
"How can a DBMS database migration be made easier?"
] | {
"text": [
"vendor provides tools"
],
"answer_start": [
1064
]
} |
gem-squad_v2-train-7658 | 5a8c91a5fd22b3001a8d8b42 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | What is portable from one DBMS to another? | What is portable from one DBMS to another? | [
"What is portable from one DBMS to another?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7659 | 5a8c91a5fd22b3001a8d8b43 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | What kind of database is migration impossible from? | What kind of database is migration impossible from? | [
"What kind of database is migration impossible from?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7660 | 5a8c91a5fd22b3001a8d8b44 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | What is always an easy and cheap project for an individual? | What is always an easy and cheap project for an individual? | [
"What is always an easy and cheap project for an individual?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7661 | 5a8c91a5fd22b3001a8d8b45 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | What no longer exist to help migration between specific DBMSs? | What no longer exist to help migration between specific DBMSs? | [
"What no longer exist to help migration between specific DBMSs?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7662 | 5a8c91a5fd22b3001a8d8b46 | Database | A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs. | What is not typically provided by a DBMS vendor? | What is not typically provided by a DBMS vendor? | [
"What is not typically provided by a DBMS vendor?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7663 | 572fb814a23a5019007fc8db | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | Name a reason to take a database backward in time? | Name a reason to take a database backward in time? | [
"Name a reason to take a database backward in time?"
] | {
"text": [
"database is found corrupted"
],
"answer_start": [
109
]
} |
gem-squad_v2-train-7664 | 572fb814a23a5019007fc8dc | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | Is each database backup kept in the same file? | Is each database backup kept in the same file? | [
"Is each database backup kept in the same file?"
] | {
"text": [
"dedicated backup files"
],
"answer_start": [
413
]
} |
gem-squad_v2-train-7665 | 572fb814a23a5019007fc8dd | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | Who can restore a database that has been corrupted? | Who can restore a database that has been corrupted? | [
"Who can restore a database that has been corrupted?"
] | {
"text": [
"database administrator"
],
"answer_start": [
541
]
} |
gem-squad_v2-train-7666 | 572fb814a23a5019007fc8de | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | What parameter is requiret to restore a database? | What parameter is requiret to restore a database? | [
"What parameter is requiret to restore a database?"
] | {
"text": [
"desired point in time"
],
"answer_start": [
642
]
} |
gem-squad_v2-train-7667 | 5a8c92c4fd22b3001a8d8b60 | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | What is not a reason to take a database backward in time? | What is not a reason to take a database backward in time? | [
"What is not a reason to take a database backward in time?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7668 | 5a8c92c4fd22b3001a8d8b61 | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | What type of file has no dedicated ones involved? | What type of file has no dedicated ones involved? | [
"What type of file has no dedicated ones involved?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7669 | 5a8c92c4fd22b3001a8d8b62 | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | Who can restore a database that has been deleted? | Who can restore a database that has been deleted? | [
"Who can restore a database that has been deleted?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7670 | 5a8c92c4fd22b3001a8d8b63 | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | What can't be restored to a previous date? | What can't be restored to a previous date? | [
"What can't be restored to a previous date?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7671 | 5a8c92c4fd22b3001a8d8b64 | Database | Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state. | What operation can be done only once per year? | What operation can be done only once per year? | [
"What operation can be done only once per year?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7672 | 572fb959947a6a140053cbe6 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | How can static analysis be useful with query languages? | How can static analysis be useful with query languages? | [
"How can static analysis be useful with query languages?"
] | {
"text": [
"software verification"
],
"answer_start": [
31
]
} |
gem-squad_v2-train-7673 | 572fb959947a6a140053cbe7 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | What do query languages support in abstract interpretation frameworks? | What do query languages support in abstract interpretation frameworks? | [
"What do query languages support in abstract interpretation frameworks?"
] | {
"text": [
"sound approximation techniques"
],
"answer_start": [
258
]
} |
gem-squad_v2-train-7674 | 572fb959947a6a140053cbe8 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | What is a security measure that uses a relational database system? | What is a security measure that uses a relational database system? | [
"What is a security measure that uses a relational database system?"
] | {
"text": [
"watermarking"
],
"answer_start": [
559
]
} |
gem-squad_v2-train-7675 | 572fb959947a6a140053cbe9 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | Can query languages be adjusted? | Can query languages be adjusted? | [
"Can query languages be adjusted?"
] | {
"text": [
"according to suitable abstractions of the concrete domain of data"
],
"answer_start": [
336
]
} |
gem-squad_v2-train-7676 | 5a8c935dfd22b3001a8d8b72 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | Why is static analysis impossible with query languages? | Why is static analysis impossible with query languages? | [
"Why is static analysis impossible with query languages?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7677 | 5a8c935dfd22b3001a8d8b73 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | What do query languages oppose in abstract interpretation frameworks? | What do query languages oppose in abstract interpretation frameworks? | [
"What do query languages oppose in abstract interpretation frameworks?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7678 | 5a8c935dfd22b3001a8d8b74 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | What is a security measure that no longer uses a relational database system? | What is a security measure that no longer uses a relational database system? | [
"What is a security measure that no longer uses a relational database system?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7679 | 5a8c935dfd22b3001a8d8b75 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | What has very few interesting applications? | What has very few interesting applications? | [
"What has very few interesting applications?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7680 | 5a8c935dfd22b3001a8d8b76 | Database | Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc. | What techniques are now forbidden for software verification? | What techniques are now forbidden for software verification? | [
"What techniques are now forbidden for software verification?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7681 | 56ddee969a695914005b96d2 | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | What is another term meaning Iranian languages? | What is another term meaning Iranian languages? | [
"What is another term meaning Iranian languages?"
] | {
"text": [
"Iranic languages"
],
"answer_start": [
25
]
} |
gem-squad_v2-train-7682 | 56ddee969a695914005b96d3 | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | What are the Iranic languages a subgroup of? | What are the Iranic languages a subgroup of? | [
"What are the Iranic languages a subgroup of?"
] | {
"text": [
"Indo-Iranian languages"
],
"answer_start": [
63
]
} |
gem-squad_v2-train-7683 | 56ddee969a695914005b96d4 | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | What are Indo-Iranian languages a subset of? | What are Indo-Iranian languages a subset of? | [
"What are Indo-Iranian languages a subset of?"
] | {
"text": [
"Indo-European language family"
],
"answer_start": [
121
]
} |
gem-squad_v2-train-7684 | 56ddee969a695914005b96d5 | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | When did the change from Old Iranian to Middle Iranian occur? | When did the change from Old Iranian to Middle Iranian occur? | [
"When did the change from Old Iranian to Middle Iranian occur?"
] | {
"text": [
"400 BCE"
],
"answer_start": [
293
]
} |
gem-squad_v2-train-7685 | 56ddee969a695914005b96d6 | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | What is an example of a Sassanid language? | What is an example of a Sassanid language? | [
"What is an example of a Sassanid language?"
] | {
"text": [
"Middle Persian"
],
"answer_start": [
564
]
} |
gem-squad_v2-train-7686 | 5a18c2e19aa02b0018605eaa | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | What stage of Iranian languages from 400 BCE to 900 CE includes old Persian? | What stage of Iranian languages from 400 BCE to 900 CE includes old Persian? | [
"What stage of Iranian languages from 400 BCE to 900 CE includes old Persian?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7687 | 5a18c2e19aa02b0018605eab | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | What stage of Iranian language was in use until 400 BCE and included Parthian and Bactrian? | What stage of Iranian language was in use until 400 BCE and included Parthian and Bactrian? | [
"What stage of Iranian language was in use until 400 BCE and included Parthian and Bactrian?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7688 | 5a18c2e19aa02b0018605eac | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | When did the change from old Iranian to new Iranian occur? | When did the change from old Iranian to new Iranian occur? | [
"When did the change from old Iranian to new Iranian occur?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7689 | 5a18c2e19aa02b0018605ead | Iranian_languages | The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian. | Where are the old Iranian languages Parthian and Bactrian from? | Where are the old Iranian languages Parthian and Bactrian from? | [
"Where are the old Iranian languages Parthian and Bactrian from?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7690 | 56ddeed19a695914005b96dd | Iranian_languages | As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi. | How many different Iranian languages exist? | How many different Iranian languages exist? | [
"How many different Iranian languages exist?"
] | {
"text": [
"86"
],
"answer_start": [
121
]
} |
gem-squad_v2-train-7691 | 5a18c3b79aa02b0018605eb2 | Iranian_languages | As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi. | In what year were there hundred and 50 to 200 Iranian languages | In what year were there hundred and 50 to 200 Iranian languages | [
"In what year were there hundred and 50 to 200 Iranian languages"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7692 | 5a18c3b79aa02b0018605eb3 | Iranian_languages | As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi. | What are some of the largest among the 200 Iranian languages? | What are some of the largest among the 200 Iranian languages? | [
"What are some of the largest among the 200 Iranian languages?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7693 | 5a18c3b79aa02b0018605eb4 | Iranian_languages | As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi. | What were their 86 million of in 2008 | What were their 86 million of in 2008 | [
"What were their 86 million of in 2008"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7694 | 56ddef1266d3e219004dae2b | Iranian_languages | The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya. | Iranian languages are all said to be derived from which predecessor? | Iranian languages are all said to be derived from which predecessor? | [
"Iranian languages are all said to be derived from which predecessor?"
] | {
"text": [
"Proto-Iranian"
],
"answer_start": [
78
]
} |
gem-squad_v2-train-7695 | 56ddef1266d3e219004dae2c | Iranian_languages | The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya. | From what languages does the word Aryao come? | From what languages does the word Aryao come? | [
"From what languages does the word Aryao come?"
] | {
"text": [
"Persian and Sanskrit"
],
"answer_start": [
127
]
} |
gem-squad_v2-train-7696 | 5a18c4619aa02b0018605eb8 | Iranian_languages | The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya. | What is any language that descends from ancestral Persian? | What is any language that descends from ancestral Persian? | [
"What is any language that descends from ancestral Persian?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7697 | 5a18c4619aa02b0018605eb9 | Iranian_languages | The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya. | What word is derived from Sanskrit and Arya? | What word is derived from Sanskrit and Arya? | [
"What word is derived from Sanskrit and Arya?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7698 | 5a18c4619aa02b0018605eba | Iranian_languages | The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya. | Arya is derived from what ancestral language? | Arya is derived from what ancestral language? | [
"Arya is derived from what ancestral language?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-7699 | 56ddef9d9a695914005b96ea | Iranian_languages | The use of the term for the Iranian language family was introduced in 1836 by Christian Lassen. Robert Needham Cust used the term Irano-Aryan in 1878, and Orientalists such as George Abraham Grierson and Max Müller contrasted Irano-Aryan (Iranian) and Indo-Aryan (Indic). Some recent scholarship, primarily in German, has revived this convention. | When was the phrase Iranian language family first used? | When was the phrase Iranian language family first used? | [
"When was the phrase Iranian language family first used?"
] | {
"text": [
"1836"
],
"answer_start": [
70
]
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.