gem_id stringlengths 20 25 | id stringlengths 24 24 | title stringlengths 3 59 | context stringlengths 151 3.71k | question stringlengths 1 270 | target stringlengths 1 270 | references list | answers dict |
|---|---|---|---|---|---|---|---|
gem-squad_v2-train-8100 | 5ad0163077cf76001a686958 | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | Who takes different steps to allow infringement? | Who takes different steps to allow infringement? | [
"Who takes different steps to allow infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8101 | 5ad0163077cf76001a686959 | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | Who never takes different steps to prevent infringement? | Who never takes different steps to prevent infringement? | [
"Who never takes different steps to prevent infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8102 | 5ad0163077cf76001a68695a | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | What is the minor focus of these steps? | What is the minor focus of these steps? | [
"What is the minor focus of these steps?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8103 | 5ad0163077cf76001a68695b | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | What kinds of legislation aren't a strategy for preventing infringement? | What kinds of legislation aren't a strategy for preventing infringement? | [
"What kinds of legislation aren't a strategy for preventing infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8104 | 5ad0163077cf76001a68695c | Copyright_infringement | Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased. | What doesn't DRM and anti-circumvention laws do? | What doesn't DRM and anti-circumvention laws do? | [
"What doesn't DRM and anti-circumvention laws do?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8105 | 5726db29708984140094d3b3 | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | How have governments lowered infringement rates? | How have governments lowered infringement rates? | [
"How have governments lowered infringement rates?"
] | {
"text": [
"narrowing the scope of what is considered infringing"
],
"answer_start": [
42
]
} |
gem-squad_v2-train-8106 | 5726db29708984140094d3b4 | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | Besides upholding international treaty, what else have countries done specifically to digital works and uses? | Besides upholding international treaty, what else have countries done specifically to digital works and uses? | [
"Besides upholding international treaty, what else have countries done specifically to digital works and uses?"
] | {
"text": [
"enacted compulsory licensing laws"
],
"answer_start": [
220
]
} |
gem-squad_v2-train-8107 | 5726db29708984140094d3b5 | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | What law in the US considers digital transmission of audio to be licensed if certain conditions are met? | What law in the US considers digital transmission of audio to be licensed if certain conditions are met? | [
"What law in the US considers digital transmission of audio to be licensed if certain conditions are met?"
] | {
"text": [
"DMCA"
],
"answer_start": [
333
]
} |
gem-squad_v2-train-8108 | 5726db29708984140094d3b6 | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | What else does this law provide to service providers? | What else does this law provide to service providers? | [
"What else does this law provide to service providers?"
] | {
"text": [
"safe harbor"
],
"answer_start": [
573
]
} |
gem-squad_v2-train-8109 | 5726db29708984140094d3b7 | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | Who does this law target? | Who does this law target? | [
"Who does this law target?"
] | {
"text": [
"providers whose users are suspected of copyright infringement"
],
"answer_start": [
605
]
} |
gem-squad_v2-train-8110 | 5ad016b077cf76001a68696c | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | How have governments increased infringement rates? | How have governments increased infringement rates? | [
"How have governments increased infringement rates?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8111 | 5ad016b077cf76001a68696d | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | Besides upholding international treaty, what else haven't countries done specifically to digital works and uses? | Besides upholding international treaty, what else haven't countries done specifically to digital works and uses? | [
"Besides upholding international treaty, what else haven't countries done specifically to digital works and uses?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8112 | 5ad016b077cf76001a68696e | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | What law in the UN considers digital transmission of audio to be licensed if certain conditions are met? | What law in the UN considers digital transmission of audio to be licensed if certain conditions are met? | [
"What law in the UN considers digital transmission of audio to be licensed if certain conditions are met?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8113 | 5ad016b077cf76001a68696f | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | What else doesn't this law provide to service providers? | What else doesn't this law provide to service providers? | [
"What else doesn't this law provide to service providers?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8114 | 5ad016b077cf76001a686970 | Copyright_infringement | Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing. | Who doesn't this law target? | Who doesn't this law target? | [
"Who doesn't this law target?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8115 | 5726db83708984140094d3c5 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What do some copyright owners do by reducing the scope of infringement? | What do some copyright owners do by reducing the scope of infringement? | [
"What do some copyright owners do by reducing the scope of infringement?"
] | {
"text": [
"employing relatively permissive, \"open\" licensing"
],
"answer_start": [
89
]
} |
gem-squad_v2-train-8116 | 5726db83708984140094d3c6 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What must a user do under a prepared license? | What must a user do under a prepared license? | [
"What must a user do under a prepared license?"
] | {
"text": [
"adhere to certain conditions"
],
"answer_start": [
405
]
} |
gem-squad_v2-train-8117 | 5726db83708984140094d3c7 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | Besides lessening the burden on the courts, what is the effect of this license? | Besides lessening the burden on the courts, what is the effect of this license? | [
"Besides lessening the burden on the courts, what is the effect of this license?"
] | {
"text": [
"reducing infringement"
],
"answer_start": [
458
]
} |
gem-squad_v2-train-8118 | 5726db83708984140094d3c8 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What is an example of a free software license? | What is an example of a free software license? | [
"What is an example of a free software license?"
] | {
"text": [
"GNU General Public License"
],
"answer_start": [
661
]
} |
gem-squad_v2-train-8119 | 5726db83708984140094d3c9 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What works do Creative Commons licenses generally apply to? | What works do Creative Commons licenses generally apply to? | [
"What works do Creative Commons licenses generally apply to?"
] | {
"text": [
"visual and literary works"
],
"answer_start": [
765
]
} |
gem-squad_v2-train-8120 | 5ad0172677cf76001a686980 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What do some copyright owners do by increasing the scope of infringement? | What do some copyright owners do by increasing the scope of infringement? | [
"What do some copyright owners do by increasing the scope of infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8121 | 5ad0172677cf76001a686981 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What mustn't a user do under a prepared license? | What mustn't a user do under a prepared license? | [
"What mustn't a user do under a prepared license?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8122 | 5ad0172677cf76001a686982 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | Besides heightening the burden on the courts, what is the effect of this license? | Besides heightening the burden on the courts, what is the effect of this license? | [
"Besides heightening the burden on the courts, what is the effect of this license?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8123 | 5ad0172677cf76001a686983 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What is an example of a paid software license? | What is an example of a paid software license? | [
"What is an example of a paid software license?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8124 | 5ad0172677cf76001a686984 | Copyright_infringement | Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works. | What works do Creative Commons licenses generally not apply to? | What works do Creative Commons licenses generally not apply to? | [
"What works do Creative Commons licenses generally not apply to?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8125 | 5726dc14708984140094d3db | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | How long is a movie typically released in theaters for? | How long is a movie typically released in theaters for? | [
"How long is a movie typically released in theaters for?"
] | {
"text": [
"approximately 16 and a half weeks"
],
"answer_start": [
157
]
} |
gem-squad_v2-train-8126 | 5726dc14708984140094d3dc | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | During this time, how are digital versions of the movie transported in data storage devices? | During this time, how are digital versions of the movie transported in data storage devices? | [
"During this time, how are digital versions of the movie transported in data storage devices?"
] | {
"text": [
"by couriers"
],
"answer_start": [
368
]
} |
gem-squad_v2-train-8127 | 5726dc14708984140094d3dd | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | What can be done to a movie to only allow it to show at certain times? | What can be done to a movie to only allow it to show at certain times? | [
"What can be done to a movie to only allow it to show at certain times?"
] | {
"text": [
"encrypted"
],
"answer_start": [
430
]
} |
gem-squad_v2-train-8128 | 5726dc14708984140094d3de | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | What can be coded to films to find the source of illegal copies? | What can be coded to films to find the source of illegal copies? | [
"What can be coded to films to find the source of illegal copies?"
] | {
"text": [
"Anti-Piracy marks can be added"
],
"answer_start": [
547
]
} |
gem-squad_v2-train-8129 | 5726dc14708984140094d3df | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | What inferior versions of movies are available for piracy during the theatrical run of a movie called? | What inferior versions of movies are available for piracy during the theatrical run of a movie called? | [
"What inferior versions of movies are available for piracy during the theatrical run of a movie called?"
] | {
"text": [
"\"cams\" made by video recordings of the movie screens"
],
"answer_start": [
768
]
} |
gem-squad_v2-train-8130 | 5ad017ab77cf76001a68699a | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | How long is a movie atypically released in theaters for? | How long is a movie atypically released in theaters for? | [
"How long is a movie atypically released in theaters for?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8131 | 5ad017ab77cf76001a68699b | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | During this time, how aren't digital versions of the movie transported in data storage devices? | During this time, how aren't digital versions of the movie transported in data storage devices? | [
"During this time, how aren't digital versions of the movie transported in data storage devices?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8132 | 5ad017ab77cf76001a68699c | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | What can't be done to a movie to only allow it to show at certain times? | What can't be done to a movie to only allow it to show at certain times? | [
"What can't be done to a movie to only allow it to show at certain times?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8133 | 5ad017ab77cf76001a68699d | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | What can be coded to films to find the source of legal copies? | What can be coded to films to find the source of legal copies? | [
"What can be coded to films to find the source of legal copies?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8134 | 5ad017ab77cf76001a68699e | Copyright_infringement | To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version. | What superior versions of movies are available for piracy during the theatrical run of a movie called? | What superior versions of movies are available for piracy during the theatrical run of a movie called? | [
"What superior versions of movies are available for piracy during the theatrical run of a movie called?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8135 | 5726dc5add62a815002e9312 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What 2010 body found how difficult it is to accurately report the financial impact of infringement? | What 2010 body found how difficult it is to accurately report the financial impact of infringement? | [
"What 2010 body found how difficult it is to accurately report the financial impact of infringement?"
] | {
"text": [
"U.S. GAO"
],
"answer_start": [
4
]
} |
gem-squad_v2-train-8136 | 5726dc5add62a815002e9313 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | How many commanly cited estimates did the body report on? | How many commanly cited estimates did the body report on? | [
"How many commanly cited estimates did the body report on?"
] | {
"text": [
"three"
],
"answer_start": [
194
]
} |
gem-squad_v2-train-8137 | 5726dc5add62a815002e9314 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What did the FBI use as a source? | What did the FBI use as a source? | [
"What did the FBI use as a source?"
] | {
"text": [
"estimate"
],
"answer_start": [
361
]
} |
gem-squad_v2-train-8138 | 5726dc5add62a815002e9315 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What report said the data could not be substantiated or traced to a reliable data source? | What report said the data could not be substantiated or traced to a reliable data source? | [
"What report said the data could not be substantiated or traced to a reliable data source?"
] | {
"text": [
"GAO report"
],
"answer_start": [
281
]
} |
gem-squad_v2-train-8139 | 5ad0182477cf76001a6869a4 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What 2010 body found how easy it is to accurately report the financial impact of infringement? | What 2010 body found how easy it is to accurately report the financial impact of infringement? | [
"What 2010 body found how easy it is to accurately report the financial impact of infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8140 | 5ad0182477cf76001a6869a5 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What 2010 body found how difficult it is to inaccurately report the financial impact of infringement? | What 2010 body found how difficult it is to inaccurately report the financial impact of infringement? | [
"What 2010 body found how difficult it is to inaccurately report the financial impact of infringement?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8141 | 5ad0182477cf76001a6869a6 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | How many uncommonly cited estimates did the body report on? | How many uncommonly cited estimates did the body report on? | [
"How many uncommonly cited estimates did the body report on?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8142 | 5ad0182477cf76001a6869a7 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What didn't the FBI use as a source? | What didn't the FBI use as a source? | [
"What didn't the FBI use as a source?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8143 | 5ad0182477cf76001a6869a8 | Copyright_infringement | The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology." | What report said the data could be substantiated or traced to a reliable data source? | What report said the data could be substantiated or traced to a reliable data source? | [
"What report said the data could be substantiated or traced to a reliable data source?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8144 | 5726dcc0f1498d1400e8eda8 | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Who did a study in 2007 regarding the five countries with the highest rates of software piracy? | Who did a study in 2007 regarding the five countries with the highest rates of software piracy? | [
"Who did a study in 2007 regarding the five countries with the highest rates of software piracy?"
] | {
"text": [
"BSA and International Data Corporation"
],
"answer_start": [
20
]
} |
gem-squad_v2-train-8145 | 5726dcc0f1498d1400e8eda9 | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Which country had the lowest rate of software piracy? | Which country had the lowest rate of software piracy? | [
"Which country had the lowest rate of software piracy?"
] | {
"text": [
"U.S."
],
"answer_start": [
331
]
} |
gem-squad_v2-train-8146 | 5726dcc0f1498d1400e8edaa | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Which region had the highest loss? | Which region had the highest loss? | [
"Which region had the highest loss?"
] | {
"text": [
"Asia-Pacific"
],
"answer_start": [
456
]
} |
gem-squad_v2-train-8147 | 5726dcc0f1498d1400e8edab | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | How much did the EU lose? | How much did the EU lose? | [
"How much did the EU lose?"
] | {
"text": [
"$12,383,000"
],
"answer_start": [
615
]
} |
gem-squad_v2-train-8148 | 5726dcc0f1498d1400e8edac | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Where was the lowest amount of U.S. dollars lost? | Where was the lowest amount of U.S. dollars lost? | [
"Where was the lowest amount of U.S. dollars lost?"
] | {
"text": [
"Middle East/Africa region"
],
"answer_start": [
678
]
} |
gem-squad_v2-train-8149 | 5ad0187f77cf76001a6869be | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Who did a study in 2000 regarding the five countries with the highest rates of software piracy? | Who did a study in 2000 regarding the five countries with the highest rates of software piracy? | [
"Who did a study in 2000 regarding the five countries with the highest rates of software piracy?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8150 | 5ad0187f77cf76001a6869bf | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Who did a study in 2007 regarding the five cities with the highest rates of software piracy? | Who did a study in 2007 regarding the five cities with the highest rates of software piracy? | [
"Who did a study in 2007 regarding the five cities with the highest rates of software piracy?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8151 | 5ad0187f77cf76001a6869c0 | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Which country had the highest rate of hardware piracy? | Which country had the highest rate of hardware piracy? | [
"Which country had the highest rate of hardware piracy?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8152 | 5ad0187f77cf76001a6869c1 | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | Which region had the highest gain? | Which region had the highest gain? | [
"Which region had the highest gain?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8153 | 5ad0187f77cf76001a6869c2 | Copyright_infringement | According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented. | How much did the EU gain? | How much did the EU gain? | [
"How much did the EU gain?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8154 | 5726dd035951b619008f804d | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | Who else did the BSA issues a report in 2011 with? | Who else did the BSA issues a report in 2011 with? | [
"Who else did the BSA issues a report in 2011 with?"
] | {
"text": [
"IDC and Ipsos Public Affairs"
],
"answer_start": [
50
]
} |
gem-squad_v2-train-8155 | 5726dd035951b619008f804e | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What percentage of people admit to pirating software? | What percentage of people admit to pirating software? | [
"What percentage of people admit to pirating software?"
] | {
"text": [
"57 percent"
],
"answer_start": [
148
]
} |
gem-squad_v2-train-8156 | 5726dd035951b619008f804f | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What was the commercial value of pirated software in 2011? | What was the commercial value of pirated software in 2011? | [
"What was the commercial value of pirated software in 2011?"
] | {
"text": [
"US$63.4 billion"
],
"answer_start": [
329
]
} |
gem-squad_v2-train-8157 | 5726dd035951b619008f8050 | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What nation had the higest piracy rate? | What nation had the higest piracy rate? | [
"What nation had the higest piracy rate?"
] | {
"text": [
"Zimbabwe"
],
"answer_start": [
501
]
} |
gem-squad_v2-train-8158 | 5726dd035951b619008f8051 | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What was the U.S.'s piracy rate? | What was the U.S.'s piracy rate? | [
"What was the U.S.'s piracy rate?"
] | {
"text": [
"19%"
],
"answer_start": [
620
]
} |
gem-squad_v2-train-8159 | 5ad018ce77cf76001a6869c8 | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | Who else did the BSA issues a report in 2001 with? | Who else did the BSA issues a report in 2001 with? | [
"Who else did the BSA issues a report in 2001 with?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8160 | 5ad018ce77cf76001a6869c9 | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What percentage of people admit to pirating hardware? | What percentage of people admit to pirating hardware? | [
"What percentage of people admit to pirating hardware?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8161 | 5ad018ce77cf76001a6869ca | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What was the commercial value of pirated hardware in 2011? | What was the commercial value of pirated hardware in 2011? | [
"What was the commercial value of pirated hardware in 2011?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8162 | 5ad018ce77cf76001a6869cb | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What nation had the lowest nonpiracy rate? | What nation had the lowest nonpiracy rate? | [
"What nation had the lowest nonpiracy rate?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8163 | 5ad018ce77cf76001a6869cc | Copyright_infringement | In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%. | What was the U.N.'s piracy rate? | What was the U.N.'s piracy rate? | [
"What was the U.N.'s piracy rate?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8164 | 5726dd455951b619008f8069 | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | Who reported that piracy took $12.5 billion from the U.S. economy? | Who reported that piracy took $12.5 billion from the U.S. economy? | [
"Who reported that piracy took $12.5 billion from the U.S. economy?"
] | {
"text": [
"Institute for Policy Innovation"
],
"answer_start": [
13
]
} |
gem-squad_v2-train-8165 | 5726dd455951b619008f806a | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | How much money have retailers lost? | How much money have retailers lost? | [
"How much money have retailers lost?"
] | {
"text": [
"over a billion dollars"
],
"answer_start": [
291
]
} |
gem-squad_v2-train-8166 | 5726dd455951b619008f806b | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | How many production-level jobs were lost? | How many production-level jobs were lost? | [
"How many production-level jobs were lost?"
] | {
"text": [
"46,000"
],
"answer_start": [
344
]
} |
gem-squad_v2-train-8167 | 5726dd455951b619008f806c | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | Which government lost $422 million in potential tax money? | Which government lost $422 million in potential tax money? | [
"Which government lost $422 million in potential tax money?"
] | {
"text": [
"U.S. government"
],
"answer_start": [
414
]
} |
gem-squad_v2-train-8168 | 5ad0193b77cf76001a6869da | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | Who reported that piracy gained $12.5 billion for the U.S. economy? | Who reported that piracy gained $12.5 billion for the U.S. economy? | [
"Who reported that piracy gained $12.5 billion for the U.S. economy?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8169 | 5ad0193b77cf76001a6869db | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | How much money have retailers made? | How much money have retailers made? | [
"How much money have retailers made?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8170 | 5ad0193b77cf76001a6869dc | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | How many production-level jobs were gained? | How many production-level jobs were gained? | [
"How many production-level jobs were gained?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8171 | 5ad0193b77cf76001a6869dd | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | How many production-level jobs weren't lost? | How many production-level jobs weren't lost? | [
"How many production-level jobs weren't lost?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8172 | 5ad0193b77cf76001a6869de | Copyright_infringement | In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue. | Which government made $422 million in potential tax money? | Which government made $422 million in potential tax money? | [
"Which government made $422 million in potential tax money?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8173 | 5726dd7af1498d1400e8ede2 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What book did Professor Aram Sinnreich write? | What book did Professor Aram Sinnreich write? | [
"What book did Professor Aram Sinnreich write?"
] | {
"text": [
"The Piracy Crusade"
],
"answer_start": [
38
]
} |
gem-squad_v2-train-8174 | 5726dd7af1498d1400e8ede3 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What did Sinnreich call the link between lower music sales and peer-to-peer sharing site? | What did Sinnreich call the link between lower music sales and peer-to-peer sharing site? | [
"What did Sinnreich call the link between lower music sales and peer-to-peer sharing site?"
] | {
"text": [
"tenuous"
],
"answer_start": [
186
]
} |
gem-squad_v2-train-8175 | 5726dd7af1498d1400e8ede4 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What was the industry going through? | What was the industry going through? | [
"What was the industry going through?"
] | {
"text": [
"artificial expansion"
],
"answer_start": [
294
]
} |
gem-squad_v2-train-8176 | 5726dd7af1498d1400e8ede5 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What does he call the merging of economic, political and technological forces that drove the music industry? | What does he call the merging of economic, political and technological forces that drove the music industry? | [
"What does he call the merging of economic, political and technological forces that drove the music industry?"
] | {
"text": [
"perfect bubble"
],
"answer_start": [
341
]
} |
gem-squad_v2-train-8177 | 5ad019e277cf76001a6869e4 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What book did Professor Aram Sinnreich read? | What book did Professor Aram Sinnreich read? | [
"What book did Professor Aram Sinnreich read?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8178 | 5ad019e277cf76001a6869e5 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What book didn't Professor Aram Sinnreich write? | What book didn't Professor Aram Sinnreich write? | [
"What book didn't Professor Aram Sinnreich write?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8179 | 5ad019e277cf76001a6869e6 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What didn't Sinnreich call the link between lower music sales and peer-to-peer sharing site? | What didn't Sinnreich call the link between lower music sales and peer-to-peer sharing site? | [
"What didn't Sinnreich call the link between lower music sales and peer-to-peer sharing site?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8180 | 5ad019e277cf76001a6869e7 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What wasn't the industry going through? | What wasn't the industry going through? | [
"What wasn't the industry going through?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8181 | 5ad019e277cf76001a6869e8 | Copyright_infringement | Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century". | What doesn't he call the merging of economic, political and technological forces that drove the music industry? | What doesn't he call the merging of economic, political and technological forces that drove the music industry? | [
"What doesn't he call the merging of economic, political and technological forces that drove the music industry?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8182 | 5726ddd7f1498d1400e8edea | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What was the estimated total value of pirated software in 2010? | What was the estimated total value of pirated software in 2010? | [
"What was the estimated total value of pirated software in 2010?"
] | {
"text": [
"$59 billion"
],
"answer_start": [
134
]
} |
gem-squad_v2-train-8183 | 5726ddd7f1498d1400e8edeb | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | Who accounted for over half the total? | Who accounted for over half the total? | [
"Who accounted for over half the total?"
] | {
"text": [
"emerging markets"
],
"answer_start": [
160
]
} |
gem-squad_v2-train-8184 | 5726ddd7f1498d1400e8edec | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What did the established markets receive for the first time? | What did the established markets receive for the first time? | [
" What did the established markets receive for the first time?"
] | {
"text": [
"less PC shipments than emerging economies"
],
"answer_start": [
287
]
} |
gem-squad_v2-train-8185 | 5726ddd7f1498d1400e8eded | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What country has the highest retail value of software? | What country has the highest retail value of software? | [
"What country has the highest retail value of software?"
] | {
"text": [
"China"
],
"answer_start": [
649
]
} |
gem-squad_v2-train-8186 | 5726ddd7f1498d1400e8edee | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What percentage of software in Africa is illegal? | What percentage of software in Africa is illegal? | [
"What percentage of software in Africa is illegal?"
] | {
"text": [
"83 percent"
],
"answer_start": [
880
]
} |
gem-squad_v2-train-8187 | 5ad01a3277cf76001a6869f8 | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What was the estimated total value of pirated software in 2000? | What was the estimated total value of pirated software in 2000? | [
"What was the estimated total value of pirated software in 2000?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8188 | 5ad01a3277cf76001a6869f9 | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What was the known total value of pirated software in 2010? | What was the known total value of pirated software in 2010? | [
"What was the known total value of pirated software in 2010?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8189 | 5ad01a3277cf76001a6869fa | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | Who accounted for less than half the total? | Who accounted for less than half the total? | [
"Who accounted for less than half the total?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8190 | 5ad01a3277cf76001a6869fb | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What did the established markets receive for the last time? | What did the established markets receive for the last time? | [
"What did the established markets receive for the last time?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8191 | 5ad01a3277cf76001a6869fc | Copyright_infringement | The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa). | What country has the lowest retail value of software? | What country has the lowest retail value of software? | [
"What country has the lowest retail value of software?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8192 | 57265912dd62a815002e8252 | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | What is the most common Christian denomination in Thuringia? | What is the most common Christian denomination in Thuringia? | [
"What is the most common Christian denomination in Thuringia? "
] | {
"text": [
"Lutheranism"
],
"answer_start": [
98
]
} |
gem-squad_v2-train-8193 | 57265912dd62a815002e8253 | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | How much of the Thuringia population is non-religious? | How much of the Thuringia population is non-religious? | [
"How much of the Thuringia population is non-religious?"
] | {
"text": [
"Today over two thirds of the population"
],
"answer_start": [
229
]
} |
gem-squad_v2-train-8194 | 57265912dd62a815002e8254 | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | Which church in the state has the largest amount of members? | Which church in the state has the largest amount of members? | [
"Which church in the state has the largest amount of members?"
] | {
"text": [
"The Protestant Evangelical Church in Germany"
],
"answer_start": [
287
]
} |
gem-squad_v2-train-8195 | 57265912dd62a815002e8255 | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | How much of the Thuringia population are Catholic? | How much of the Thuringia population are Catholic? | [
"How much of the Thuringia population are Catholic?"
] | {
"text": [
"7.8% of the population"
],
"answer_start": [
469
]
} |
gem-squad_v2-train-8196 | 57265912dd62a815002e8256 | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | How many Jews live in Thuringia? | How many Jews live in Thuringia? | [
"How many Jews live in Thuringia?"
] | {
"text": [
"750 Jews"
],
"answer_start": [
1157
]
} |
gem-squad_v2-train-8197 | 5a7ccaf7e8bc7e001a9e202d | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | What is the least common Secular denomination in Thuringia? | What is the least common Secular denomination in Thuringia? | [
"What is the least common Secular denomination in Thuringia?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8198 | 5a7ccaf7e8bc7e001a9e202e | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | How much of the Thuringia population is gone? | How much of the Thuringia population is gone? | [
"How much of the Thuringia population is gone?"
] | {
"text": [],
"answer_start": []
} |
gem-squad_v2-train-8199 | 5a7ccaf7e8bc7e001a9e202f | Thuringia | Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence. | Which church in the state has the smallest amount of members? | Which church in the state has the smallest amount of members? | [
"Which church in the state has the smallest amount of members?"
] | {
"text": [],
"answer_start": []
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.