gem_id
stringlengths
20
25
id
stringlengths
24
24
title
stringlengths
3
59
context
stringlengths
151
3.71k
question
stringlengths
1
270
target
stringlengths
1
270
references
list
answers
dict
gem-squad_v2-train-7600
572facde04bcaa1900d76bd2
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What is an important goal in in this final stage?
What is an important goal in in this final stage?
[ "What is an important goal in in this final stage?" ]
{ "text": [ "data independence" ], "answer_start": [ 211 ] }
gem-squad_v2-train-7601
572facde04bcaa1900d76bd3
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What factor is reflected in performance requirements?
What factor is reflected in performance requirements?
[ "What factor is reflected in performance requirements?" ]
{ "text": [ "Physical design" ], "answer_start": [ 351 ] }
gem-squad_v2-train-7602
5a8c8aacfd22b3001a8d8a64
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What decisions are optional in the last stage of database design?
What decisions are optional in the last stage of database design?
[ "What decisions are optional in the last stage of database design?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7603
5a8c8aacfd22b3001a8d8a65
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What is an irrelevant goal in the final stage?
What is an irrelevant goal in the final stage?
[ "What is an irrelevant goal in the final stage?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7604
5a8c8aacfd22b3001a8d8a66
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What factor is not reflected in performance requirements?
What factor is not reflected in performance requirements?
[ "What factor is not reflected in performance requirements?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7605
5a8c8aacfd22b3001a8d8a67
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What requires no knowledge of the expected workload?
What requires no knowledge of the expected workload?
[ "What requires no knowledge of the expected workload?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7606
5a8c8aacfd22b3001a8d8a68
Database
The final stage of database design is to make the decisions that affect performance, scalability, recovery, security, and the like. This is often called physical database design. A key goal during this stage is data independence, meaning that the decisions made for performance optimization purposes should be invisible to end-users and applications. Physical design is driven mainly by performance requirements, and requires a good knowledge of the expected workload and access patterns, and a deep understanding of the features offered by the chosen DBMS.
What is no longer a key goal during the final stage?
What is no longer a key goal during the final stage?
[ "What is no longer a key goal during the final stage?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7607
572fae08a23a5019007fc877
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
How many conceptual or physical views of data are there?
How many conceptual or physical views of data are there?
[ "How many conceptual or physical views of data are there?" ]
{ "text": [ "one" ], "answer_start": [ 30 ] }
gem-squad_v2-train-7608
572fae08a23a5019007fc878
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
How many different external views of data are there?
How many different external views of data are there?
[ "How many different external views of data are there?" ]
{ "text": [ "any number" ], "answer_start": [ 116 ] }
gem-squad_v2-train-7609
572fae08a23a5019007fc879
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
What is the benefit of external views of data?
What is the benefit of external views of data?
[ "What is the benefit of external views of data?" ]
{ "text": [ "see database information in a more business-related way" ], "answer_start": [ 177 ] }
gem-squad_v2-train-7610
5a8c8c1cfd22b3001a8d8a8c
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
How many conceptual or physical views of data do not exist?
How many conceptual or physical views of data do not exist?
[ "How many conceptual or physical views of data do not exist?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7611
5a8c8c1cfd22b3001a8d8a8d
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
How many duplicated external views of data are there?
How many duplicated external views of data are there?
[ "How many duplicated external views of data are there?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7612
5a8c8c1cfd22b3001a8d8a8e
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
What is the disadvantage of external views of data?
What is the disadvantage of external views of data?
[ "What is the disadvantage of external views of data?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7613
5a8c8c1cfd22b3001a8d8a8f
Database
While there is typically only one conceptual (or logical) and physical (or internal) view of the data, there can be any number of different external views. This allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. For example, a financial department of a company needs the payment details of all employees as part of the company's expenses, but does not need details about employees that are the interest of the human resources department. Thus different departments need different views of the company's database.
Who is not allowed to see database information?
Who is not allowed to see database information?
[ "Who is not allowed to see database information?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7614
572fafeca23a5019007fc89b
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
What does the conceptual view offer?
What does the conceptual view offer?
[ "What does the conceptual view offer?" ]
{ "text": [ "a level of indirection between internal and external" ], "answer_start": [ 29 ] }
gem-squad_v2-train-7615
572fafeca23a5019007fc89c
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
How does the conceptual view handle how data is managed?
How does the conceptual view handle how data is managed?
[ "How does the conceptual view handle how data is managed?" ]
{ "text": [ "abstracts away details" ], "answer_start": [ 214 ] }
gem-squad_v2-train-7616
572fafeca23a5019007fc89d
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
What type of view does the conceptual view offer?
What type of view does the conceptual view offer?
[ "What type of view does the conceptual view offer?" ]
{ "text": [ "common" ], "answer_start": [ 109 ] }
gem-squad_v2-train-7617
5a8c8de2fd22b3001a8d8ac2
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
What does the conceptual view ignore?
What does the conceptual view ignore?
[ "What does the conceptual view ignore?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7618
5a8c8de2fd22b3001a8d8ac3
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
How does the conceptual view handle how data is erased?
How does the conceptual view handle how data is erased?
[ "How does the conceptual view handle how data is erased?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7619
5a8c8de2fd22b3001a8d8ac4
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
What type of view does the conceptual view degrade?
What type of view does the conceptual view degrade?
[ "What type of view does the conceptual view degrade?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7620
5a8c8de2fd22b3001a8d8ac5
Database
The conceptual view provides a level of indirection between internal and external. On one hand it provides a common view of the database, independent of different external view structures, and on the other hand it abstracts away details of how the data are stored or managed (internal level). In principle every level, and even every external view, can be presented by a different data model. In practice usually a given DBMS uses the same data model for both the external and the conceptual levels (e.g., relational model). The internal level, which is hidden inside the DBMS and depends on its implementation, requires a different level of detail and uses its own types of data structure types.
What view can't be presented by a different data model?
What view can't be presented by a different data model?
[ "What view can't be presented by a different data model?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7621
572fb19f04bcaa1900d76bfb
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What is responsible for putting information into permanent storage?
What is responsible for putting information into permanent storage?
[ "What is responsible for putting information into permanent storage?" ]
{ "text": [ "database engine" ], "answer_start": [ 435 ] }
gem-squad_v2-train-7622
572fb19f04bcaa1900d76bfc
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What is database storage?
What is database storage?
[ "What is database storage?" ]
{ "text": [ "physical materialization of a database" ], "answer_start": [ 41 ] }
gem-squad_v2-train-7623
572fb19f04bcaa1900d76bfd
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What do database administrators closely monitor?
What do database administrators closely monitor?
[ "What do database administrators closely monitor?" ]
{ "text": [ "storage properties and configuration setting" ], "answer_start": [ 647 ] }
gem-squad_v2-train-7624
572fb19f04bcaa1900d76bfe
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
While working, does DBMS store information in one place?
While working, does DBMS store information in one place?
[ "While working, does DBMS store information in one place?" ]
{ "text": [ "several types of storage" ], "answer_start": [ 881 ] }
gem-squad_v2-train-7625
572fb19f04bcaa1900d76bff
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What are huge quantities of information stored as?
What are huge quantities of information stored as?
[ "What are huge quantities of information stored as?" ]
{ "text": [ "bits" ], "answer_start": [ 1047 ] }
gem-squad_v2-train-7626
5a8c8e7dfd22b3001a8d8ad4
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What is responsible for losing information in permanent storage?
What is responsible for losing information in permanent storage?
[ "What is responsible for losing information in permanent storage?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7627
5a8c8e7dfd22b3001a8d8ad5
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What is no longer considered database storage?
What is no longer considered database storage?
[ "What is no longer considered database storage?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7628
5a8c8e7dfd22b3001a8d8ad6
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What do database administrators loosely monitor?
What do database administrators loosely monitor?
[ "What do database administrators loosely monitor?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7629
5a8c8e7dfd22b3001a8d8ad7
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
How many types of storage are not utilized for DBMS?
How many types of storage are not utilized for DBMS?
[ "How many types of storage are not utilized for DBMS?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7630
5a8c8e7dfd22b3001a8d8ad8
Database
Database storage is the container of the physical materialization of a database. It comprises the internal (physical) level in the database architecture. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the conceptual level and external level from the internal level when needed. Putting data into permanent storage is generally the responsibility of the database engine a.k.a. "storage engine". Though typically accessed by a DBMS through the underlying operating system (and often utilizing the operating systems' file systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., memory and external storage). The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
What are no quantities of information stored as?
What are no quantities of information stored as?
[ "What are no quantities of information stored as?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7631
572fb248947a6a140053cba4
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
What does database access limit?
What does database access limit?
[ "What does database access limit?" ]
{ "text": [ "who (a person or a certain computer program) is allowed to access what information" ], "answer_start": [ 47 ] }
gem-squad_v2-train-7632
572fb248947a6a140053cba5
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
What are examples of database objects?
What are examples of database objects?
[ "What are examples of database objects?" ]
{ "text": [ "record types, specific records, data structures" ], "answer_start": [ 209 ] }
gem-squad_v2-train-7633
572fb248947a6a140053cba6
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
Who sets database access?
Who sets database access?
[ "Who sets database access?" ]
{ "text": [ "special authorized (by the database owner) personnel" ], "answer_start": [ 507 ] }
gem-squad_v2-train-7634
5a8c8f2afd22b3001a8d8afc
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
What does database access have no influence on?
What does database access have no influence on?
[ "What does database access have no influence on?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7635
5a8c8f2afd22b3001a8d8afd
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
What are examples of the only kind of database errors?
What are examples of the only kind of database errors?
[ "What are examples of the only kind of database errors?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7636
5a8c8f2afd22b3001a8d8afe
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
Who has no database access?
Who has no database access?
[ "Who has no database access?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7637
5a8c8f2afd22b3001a8d8aff
Database
Database access control deals with controlling who (a person or a certain computer program) is allowed to access what information in the database. The information may comprise specific database objects (e.g., record types, specific records, data structures), certain computations over certain objects (e.g., query types, or specific queries), or utilizing specific access paths to the former (e.g., using specific indexes or other data structures to access information). Database access controls are set by special authorized (by the database owner) personnel that uses dedicated protected security DBMS interfaces.
Who uses dedicated unprotected security DBMS interfaces?
Who uses dedicated unprotected security DBMS interfaces?
[ "Who uses dedicated unprotected security DBMS interfaces?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7638
572fb32704bcaa1900d76c05
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
What does data security avoid?
What does data security avoid?
[ "What does data security avoid?" ]
{ "text": [ "unauthorized users from viewing or updating the database" ], "answer_start": [ 267 ] }
gem-squad_v2-train-7639
572fb32704bcaa1900d76c06
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
What is a subset of a database called that can be accessed by using a password?
What is a subset of a database called that can be accessed by using a password?
[ "What is a subset of a database called that can be accessed by using a password?" ]
{ "text": [ "subschemas" ], "answer_start": [ 415 ] }
gem-squad_v2-train-7640
572fb32704bcaa1900d76c07
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
What is possible when a DBMS interrogate and update a database?
What is possible when a DBMS interrogate and update a database?
[ "What is possible when a DBMS interrogate and update a database?" ]
{ "text": [ "managing personal databases" ], "answer_start": [ 785 ] }
gem-squad_v2-train-7641
5a8c9049fd22b3001a8d8b0c
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
What does data security support?
What does data security support?
[ "What does data security support?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7642
5a8c9049fd22b3001a8d8b0d
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
What is a subset of a database called that can be accessed by using a spell?
What is a subset of a database called that can be accessed by using a spell?
[ "What is a subset of a database called that can be accessed by using a spell?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7643
5a8c9049fd22b3001a8d8b0e
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
What is possible when a DBMS corrupts a database?
What is possible when a DBMS corrupts a database?
[ "What is possible when a DBMS corrupts a database?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7644
5a8c9049fd22b3001a8d8b0f
Database
This may be managed directly on an individual basis, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called "subschemas". For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases.
Who can view the entire contents of an employee database?
Who can view the entire contents of an employee database?
[ "Who can view the entire contents of an employee database?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7645
572fb513947a6a140053cbc4
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
What is a unit of work called in a database?
What is a unit of work called in a database?
[ "What is a unit of work called in a database?" ]
{ "text": [ "transaction" ], "answer_start": [ 136 ] }
gem-squad_v2-train-7646
572fb513947a6a140053cbc5
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
How can database transactions ensure accuracy after a crash?
How can database transactions ensure accuracy after a crash?
[ "How can database transactions ensure accuracy after a crash?" ]
{ "text": [ "fault tolerance" ], "answer_start": [ 61 ] }
gem-squad_v2-train-7647
572fb513947a6a140053cbc6
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
Are transactions limited?
Are transactions limited?
[ "Are transactions limited?" ]
{ "text": [ "Each transaction has well defined boundaries" ], "answer_start": [ 357 ] }
gem-squad_v2-train-7648
5a8c90e0fd22b3001a8d8b2e
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
What is a unit of play called in a database?
What is a unit of play called in a database?
[ "What is a unit of play called in a database?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7649
5a8c90e0fd22b3001a8d8b2f
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
How can database transactions lower accuracy after a crash?
How can database transactions lower accuracy after a crash?
[ "How can database transactions lower accuracy after a crash?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7650
5a8c90e0fd22b3001a8d8b30
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
What has poorly defined boundaries in a database?
What has poorly defined boundaries in a database?
[ "What has poorly defined boundaries in a database?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7651
5a8c90e0fd22b3001a8d8b31
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
What has no ability to recover from a crash?
What has no ability to recover from a crash?
[ "What has no ability to recover from a crash?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7652
5a8c90e0fd22b3001a8d8b32
Database
Database transactions can be used to introduce some level of fault tolerance and data integrity after recovery from a crash. A database transaction is a unit of work, typically encapsulating a number of operations over a database (e.g., reading a database object, writing, acquiring lock, etc.), an abstraction supported in database and also other systems. Each transaction has well defined boundaries in terms of which program/code executions are included in that transaction (determined by the transaction's programmer via special transaction commands).
What always encapsulates only one transaction?
What always encapsulates only one transaction?
[ "What always encapsulates only one transaction?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7653
572fb6f904bcaa1900d76c27
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
Can a DBMS be transfered to a different DBMS?
Can a DBMS be transfered to a different DBMS?
[ "Can a DBMS be transfered to a different DBMS?" ]
{ "text": [ "ano" ], "answer_start": [ 50 ] }
gem-squad_v2-train-7654
572fb6f904bcaa1900d76c28
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
Why would someone attempt to unite two different databases?
Why would someone attempt to unite two different databases?
[ "Why would someone attempt to unite two different databases?" ]
{ "text": [ "primarily economical" ], "answer_start": [ 215 ] }
gem-squad_v2-train-7655
572fb6f904bcaa1900d76c29
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
In order to merge, what must the database maintain?
In order to merge, what must the database maintain?
[ "In order to merge, what must the database maintain?" ]
{ "text": [ "database related application" ], "answer_start": [ 523 ] }
gem-squad_v2-train-7656
572fb6f904bcaa1900d76c2a
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
What are the important parts of the database related application that should be moved?
What are the important parts of the database related application that should be moved?
[ "What are the important parts of the database related application that should be moved?" ]
{ "text": [ "conceptual and external architectural levels" ], "answer_start": [ 622 ] }
gem-squad_v2-train-7657
572fb6f904bcaa1900d76c2b
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
How can a DBMS database migration be made easier?
How can a DBMS database migration be made easier?
[ "How can a DBMS database migration be made easier?" ]
{ "text": [ "vendor provides tools" ], "answer_start": [ 1064 ] }
gem-squad_v2-train-7658
5a8c91a5fd22b3001a8d8b42
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
What is portable from one DBMS to another?
What is portable from one DBMS to another?
[ "What is portable from one DBMS to another?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7659
5a8c91a5fd22b3001a8d8b43
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
What kind of database is migration impossible from?
What kind of database is migration impossible from?
[ "What kind of database is migration impossible from?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7660
5a8c91a5fd22b3001a8d8b44
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
What is always an easy and cheap project for an individual?
What is always an easy and cheap project for an individual?
[ "What is always an easy and cheap project for an individual?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7661
5a8c91a5fd22b3001a8d8b45
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
What no longer exist to help migration between specific DBMSs?
What no longer exist to help migration between specific DBMSs?
[ "What no longer exist to help migration between specific DBMSs?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7662
5a8c91a5fd22b3001a8d8b46
Database
A database built with one DBMS is not portable to another DBMS (i.e., the other DBMS cannot run it). However, in some situations it is desirable to move, migrate a database from one DBMS to another. The reasons are primarily economical (different DBMSs may have different total costs of ownership or TCOs), functional, and operational (different DBMSs may have different capabilities). The migration involves the database's transformation from one DBMS type to another. The transformation should maintain (if possible) the database related application (i.e., all related application programs) intact. Thus, the database's conceptual and external architectural levels should be maintained in the transformation. It may be desired that also some aspects of the architecture internal level are maintained. A complex or large database migration may be a complicated and costly (one-time) project by itself, which should be factored into the decision to migrate. This in spite of the fact that tools may exist to help migration between specific DBMSs. Typically a DBMS vendor provides tools to help importing databases from other popular DBMSs.
What is not typically provided by a DBMS vendor?
What is not typically provided by a DBMS vendor?
[ "What is not typically provided by a DBMS vendor?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7663
572fb814a23a5019007fc8db
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
Name a reason to take a database backward in time?
Name a reason to take a database backward in time?
[ "Name a reason to take a database backward in time?" ]
{ "text": [ "database is found corrupted" ], "answer_start": [ 109 ] }
gem-squad_v2-train-7664
572fb814a23a5019007fc8dc
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
Is each database backup kept in the same file?
Is each database backup kept in the same file?
[ "Is each database backup kept in the same file?" ]
{ "text": [ "dedicated backup files" ], "answer_start": [ 413 ] }
gem-squad_v2-train-7665
572fb814a23a5019007fc8dd
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
Who can restore a database that has been corrupted?
Who can restore a database that has been corrupted?
[ "Who can restore a database that has been corrupted?" ]
{ "text": [ "database administrator" ], "answer_start": [ 541 ] }
gem-squad_v2-train-7666
572fb814a23a5019007fc8de
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
What parameter is requiret to restore a database?
What parameter is requiret to restore a database?
[ "What parameter is requiret to restore a database?" ]
{ "text": [ "desired point in time" ], "answer_start": [ 642 ] }
gem-squad_v2-train-7667
5a8c92c4fd22b3001a8d8b60
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
What is not a reason to take a database backward in time?
What is not a reason to take a database backward in time?
[ "What is not a reason to take a database backward in time?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7668
5a8c92c4fd22b3001a8d8b61
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
What type of file has no dedicated ones involved?
What type of file has no dedicated ones involved?
[ "What type of file has no dedicated ones involved?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7669
5a8c92c4fd22b3001a8d8b62
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
Who can restore a database that has been deleted?
Who can restore a database that has been deleted?
[ "Who can restore a database that has been deleted?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7670
5a8c92c4fd22b3001a8d8b63
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
What can't be restored to a previous date?
What can't be restored to a previous date?
[ "What can't be restored to a previous date?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7671
5a8c92c4fd22b3001a8d8b64
Database
Sometimes it is desired to bring a database back to a previous state (for many reasons, e.g., cases when the database is found corrupted due to a software error, or if it has been updated with erroneous data). To achieve this a backup operation is done occasionally or continuously, where each desired database state (i.e., the values of its data and their embedding in database's data structures) is kept within dedicated backup files (many techniques exist to do this effectively). When this state is needed, i.e., when it is decided by a database administrator to bring the database back to this state (e.g., by specifying this state by a desired point in time when the database was in this state), these files are utilized to restore that state.
What operation can be done only once per year?
What operation can be done only once per year?
[ "What operation can be done only once per year?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7672
572fb959947a6a140053cbe6
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
How can static analysis be useful with query languages?
How can static analysis be useful with query languages?
[ "How can static analysis be useful with query languages?" ]
{ "text": [ "software verification" ], "answer_start": [ 31 ] }
gem-squad_v2-train-7673
572fb959947a6a140053cbe7
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
What do query languages support in abstract interpretation frameworks?
What do query languages support in abstract interpretation frameworks?
[ "What do query languages support in abstract interpretation frameworks?" ]
{ "text": [ "sound approximation techniques" ], "answer_start": [ 258 ] }
gem-squad_v2-train-7674
572fb959947a6a140053cbe8
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
What is a security measure that uses a relational database system?
What is a security measure that uses a relational database system?
[ "What is a security measure that uses a relational database system?" ]
{ "text": [ "watermarking" ], "answer_start": [ 559 ] }
gem-squad_v2-train-7675
572fb959947a6a140053cbe9
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
Can query languages be adjusted?
Can query languages be adjusted?
[ "Can query languages be adjusted?" ]
{ "text": [ "according to suitable abstractions of the concrete domain of data" ], "answer_start": [ 336 ] }
gem-squad_v2-train-7676
5a8c935dfd22b3001a8d8b72
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
Why is static analysis impossible with query languages?
Why is static analysis impossible with query languages?
[ "Why is static analysis impossible with query languages?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7677
5a8c935dfd22b3001a8d8b73
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
What do query languages oppose in abstract interpretation frameworks?
What do query languages oppose in abstract interpretation frameworks?
[ "What do query languages oppose in abstract interpretation frameworks?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7678
5a8c935dfd22b3001a8d8b74
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
What is a security measure that no longer uses a relational database system?
What is a security measure that no longer uses a relational database system?
[ "What is a security measure that no longer uses a relational database system?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7679
5a8c935dfd22b3001a8d8b75
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
What has very few interesting applications?
What has very few interesting applications?
[ "What has very few interesting applications?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7680
5a8c935dfd22b3001a8d8b76
Database
Static analysis techniques for software verification can be applied also in the scenario of query languages. In particular, the *Abstract interpretation framework has been extended to the field of query languages for relational databases as a way to support sound approximation techniques. The semantics of query languages can be tuned according to suitable abstractions of the concrete domain of data. The abstraction of relational database system has many interesting applications, in particular, for security purposes, such as fine grained access control, watermarking, etc.
What techniques are now forbidden for software verification?
What techniques are now forbidden for software verification?
[ "What techniques are now forbidden for software verification?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7681
56ddee969a695914005b96d2
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
What is another term meaning Iranian languages?
What is another term meaning Iranian languages?
[ "What is another term meaning Iranian languages?" ]
{ "text": [ "Iranic languages" ], "answer_start": [ 25 ] }
gem-squad_v2-train-7682
56ddee969a695914005b96d3
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
What are the Iranic languages a subgroup of?
What are the Iranic languages a subgroup of?
[ "What are the Iranic languages a subgroup of?" ]
{ "text": [ "Indo-Iranian languages" ], "answer_start": [ 63 ] }
gem-squad_v2-train-7683
56ddee969a695914005b96d4
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
What are Indo-Iranian languages a subset of?
What are Indo-Iranian languages a subset of?
[ "What are Indo-Iranian languages a subset of?" ]
{ "text": [ "Indo-European language family" ], "answer_start": [ 121 ] }
gem-squad_v2-train-7684
56ddee969a695914005b96d5
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
When did the change from Old Iranian to Middle Iranian occur?
When did the change from Old Iranian to Middle Iranian occur?
[ "When did the change from Old Iranian to Middle Iranian occur?" ]
{ "text": [ "400 BCE" ], "answer_start": [ 293 ] }
gem-squad_v2-train-7685
56ddee969a695914005b96d6
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
What is an example of a Sassanid language?
What is an example of a Sassanid language?
[ "What is an example of a Sassanid language?" ]
{ "text": [ "Middle Persian" ], "answer_start": [ 564 ] }
gem-squad_v2-train-7686
5a18c2e19aa02b0018605eaa
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
What stage of Iranian languages from 400 BCE to 900 CE includes old Persian?
What stage of Iranian languages from 400 BCE to 900 CE includes old Persian?
[ "What stage of Iranian languages from 400 BCE to 900 CE includes old Persian?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7687
5a18c2e19aa02b0018605eab
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
What stage of Iranian language was in use until 400 BCE and included Parthian and Bactrian?
What stage of Iranian language was in use until 400 BCE and included Parthian and Bactrian?
[ "What stage of Iranian language was in use until 400 BCE and included Parthian and Bactrian?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7688
5a18c2e19aa02b0018605eac
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
When did the change from old Iranian to new Iranian occur?
When did the change from old Iranian to new Iranian occur?
[ "When did the change from old Iranian to new Iranian occur?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7689
5a18c2e19aa02b0018605ead
Iranian_languages
The Iranian languages or Iranic languages form a branch of the Indo-Iranian languages, which in turn are a branch of the Indo-European language family. The speakers of Iranian languages are known as Iranian peoples. Historical Iranian languages are grouped in three stages: Old Iranian (until 400 BCE), Middle Iranian (400 BCE – 900 CE), and New Iranian (since 900 CE). Of the Old Iranian languages, the better understood and recorded ones are Old Persian (a language of Achaemenid Iran) and Avestan (the language of the Avesta). Middle Iranian languages included Middle Persian (a language of Sassanid Iran), Parthian, and Bactrian.
Where are the old Iranian languages Parthian and Bactrian from?
Where are the old Iranian languages Parthian and Bactrian from?
[ "Where are the old Iranian languages Parthian and Bactrian from?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7690
56ddeed19a695914005b96dd
Iranian_languages
As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi.
How many different Iranian languages exist?
How many different Iranian languages exist?
[ "How many different Iranian languages exist?" ]
{ "text": [ "86" ], "answer_start": [ 121 ] }
gem-squad_v2-train-7691
5a18c3b79aa02b0018605eb2
Iranian_languages
As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi.
In what year were there hundred and 50 to 200 Iranian languages
In what year were there hundred and 50 to 200 Iranian languages
[ "In what year were there hundred and 50 to 200 Iranian languages" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7692
5a18c3b79aa02b0018605eb3
Iranian_languages
As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi.
What are some of the largest among the 200 Iranian languages?
What are some of the largest among the 200 Iranian languages?
[ "What are some of the largest among the 200 Iranian languages?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7693
5a18c3b79aa02b0018605eb4
Iranian_languages
As of 2008, there were an estimated 150–200 million native speakers of Iranian languages. Ethnologue estimates there are 86 Iranian languages, the largest amongst them being Persian, Pashto, Kurdish, and Balochi.
What were their 86 million of in 2008
What were their 86 million of in 2008
[ "What were their 86 million of in 2008" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7694
56ddef1266d3e219004dae2b
Iranian_languages
The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya.
Iranian languages are all said to be derived from which predecessor?
Iranian languages are all said to be derived from which predecessor?
[ "Iranian languages are all said to be derived from which predecessor?" ]
{ "text": [ "Proto-Iranian" ], "answer_start": [ 78 ] }
gem-squad_v2-train-7695
56ddef1266d3e219004dae2c
Iranian_languages
The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya.
From what languages does the word Aryao come?
From what languages does the word Aryao come?
[ "From what languages does the word Aryao come?" ]
{ "text": [ "Persian and Sanskrit" ], "answer_start": [ 127 ] }
gem-squad_v2-train-7696
5a18c4619aa02b0018605eb8
Iranian_languages
The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya.
What is any language that descends from ancestral Persian?
What is any language that descends from ancestral Persian?
[ "What is any language that descends from ancestral Persian?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7697
5a18c4619aa02b0018605eb9
Iranian_languages
The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya.
What word is derived from Sanskrit and Arya?
What word is derived from Sanskrit and Arya?
[ "What word is derived from Sanskrit and Arya?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7698
5a18c4619aa02b0018605eba
Iranian_languages
The term Iranian is applied to any language which descends from the ancestral Proto-Iranian language. Iranian derives from the Persian and Sanskrit origin word Arya.
Arya is derived from what ancestral language?
Arya is derived from what ancestral language?
[ "Arya is derived from what ancestral language?" ]
{ "text": [], "answer_start": [] }
gem-squad_v2-train-7699
56ddef9d9a695914005b96ea
Iranian_languages
The use of the term for the Iranian language family was introduced in 1836 by Christian Lassen. Robert Needham Cust used the term Irano-Aryan in 1878, and Orientalists such as George Abraham Grierson and Max Müller contrasted Irano-Aryan (Iranian) and Indo-Aryan (Indic). Some recent scholarship, primarily in German, has revived this convention.
When was the phrase Iranian language family first used?
When was the phrase Iranian language family first used?
[ "When was the phrase Iranian language family first used?" ]
{ "text": [ "1836" ], "answer_start": [ 70 ] }