id stringlengths 24 24 | title stringclasses 442 values | context stringlengths 151 3.71k | question stringlengths 12 270 | answers dict |
|---|---|---|---|---|
5a5546d5134fea001a0e1a0f | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | What can an attacker install to your computer in order to collect personal data? | {
"answer_start": [],
"text": []
} |
5a5546d5134fea001a0e1a10 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | What can infect other computers from your own? | {
"answer_start": [],
"text": []
} |
5a5cb9315e8782001a9d5d82 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | What can an authorized user with access to a computer do? | {
"answer_start": [],
"text": []
} |
5a5cb9315e8782001a9d5d83 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | How are computers made secure? | {
"answer_start": [],
"text": []
} |
5a5cb9315e8782001a9d5d84 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | What does CD-ROM stand for? | {
"answer_start": [],
"text": []
} |
5a5cb9315e8782001a9d5d85 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | What is the name of a program designed to attack a computer? | {
"answer_start": [],
"text": []
} |
5a5cb9315e8782001a9d5d86 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measures, these may be able to be by passed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks. | How does a user bypass a compromised security? | {
"answer_start": [],
"text": []
} |
5709a8dd200fba140036822b | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | UI redress attack or User Interface redress attack is also known as what? | {
"answer_start": [
0
],
"text": [
"Clickjacking"
]
} |
5709a8dd200fba140036822c | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | What is a malicious technique in which an attacker tricks the user into clicking on a button or link? | {
"answer_start": [
0
],
"text": [
"Clickjacking"
]
} |
5709a8dd200fba140036822d | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | Where are the clicks meant for the top level page routed? | {
"answer_start": [
407
],
"text": [
"some other irrelevant page"
]
} |
5709a8dd200fba140036822e | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | Where would a password typed on a seemingly authetic webpage be directed? | {
"answer_start": [
748
],
"text": [
"into an invisible frame controlled by the attacker"
]
} |
5709a8dd200fba140036822f | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | How istricking the user accomplished in clickjacking? | {
"answer_start": [
264
],
"text": [
"using multiple transparent or opaque layers"
]
} |
5a5551b9134fea001a0e1a20 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | What is intended to be hijacked through a page overlay? | {
"answer_start": [],
"text": []
} |
5a5551b9134fea001a0e1a21 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | What else can be hijacked through UI redress? | {
"answer_start": [],
"text": []
} |
5a5551b9134fea001a0e1a22 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | What part of a webpage is meant to collect keystrokes? | {
"answer_start": [],
"text": []
} |
5a5551b9134fea001a0e1a23 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | Why can the user not see the other page used by the attacker? | {
"answer_start": [],
"text": []
} |
5a5551b9134fea001a0e1a24 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | Where is are the passwords and information stored by the attacker? | {
"answer_start": [],
"text": []
} |
5a5cbc6f5e8782001a9d5d96 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | What is avoiding a UI redress attack called? | {
"answer_start": [],
"text": []
} |
5a5cbc6f5e8782001a9d5d97 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | How are clicks routed back to the top level page? | {
"answer_start": [],
"text": []
} |
5a5cbc6f5e8782001a9d5d98 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | How is an legitimate webpage created? | {
"answer_start": [],
"text": []
} |
5a5cbc6f5e8782001a9d5d99 | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | What is another name for hijacking keystrokes? | {
"answer_start": [],
"text": []
} |
5a5cbc6f5e8782001a9d5d9a | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else. A similar technique can be used to hijack keystrokes. Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker. | Where is a user redirected to after putting in their password? | {
"answer_start": [],
"text": []
} |
5709a976ed30961900e843da | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | How many computers were connected to the internet in 1988? | {
"answer_start": [
14
],
"text": [
"60,000"
]
} |
5709a976ed30961900e843db | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | When was the first computer worm released? | {
"answer_start": [
137
],
"text": [
"November 2, 1988"
]
} |
5709a976ed30961900e843dc | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | Who was the first computer worm traced back to? | {
"answer_start": [
414
],
"text": [
"Robert Tappan Morris, Jr."
]
} |
5709a976ed30961900e843dd | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | What is a malicious code that demands processor time and spreads itself to other computers? | {
"answer_start": [
318
],
"text": [
"computer worm"
]
} |
5709a976ed30961900e843de | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | Why did Morris Jr make the computer worm? | {
"answer_start": [
450
],
"text": [
"he wanted to count how many machines were connected to the Internet"
]
} |
5a557057134fea001a0e1a82 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | What types of computers were connected to the internet in 1988? | {
"answer_start": [],
"text": []
} |
5a557057134fea001a0e1a83 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | On Nov 2, 1988 what caused many computers to slow down? | {
"answer_start": [],
"text": []
} |
5a557057134fea001a0e1a84 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | When was the first computer worm? | {
"answer_start": [],
"text": []
} |
5a557057134fea001a0e1a85 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | Who created the first computer worm? | {
"answer_start": [],
"text": []
} |
5a557057134fea001a0e1a86 | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | How old was the Cornell University Grad Student who created the worm? | {
"answer_start": [],
"text": []
} |
5a5ce0995e8782001a9d5dfa | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | How many computers began to slow down on Nov. 2, 1988? | {
"answer_start": [],
"text": []
} |
5a5ce0995e8782001a9d5dfb | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | Who tracked down the first computer worm? | {
"answer_start": [],
"text": []
} |
5a5ce0995e8782001a9d5dfc | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | When was the computer worm caught? | {
"answer_start": [],
"text": []
} |
5a5ce0995e8782001a9d5dfd | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | Where was the computer worm created? | {
"answer_start": [],
"text": []
} |
5a5ce0995e8782001a9d5dfe | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "computer worm". The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris, Jr. who said 'he wanted to count how many machines were connected to the Internet'. | Which internet connected computers slowed down? | {
"answer_start": [],
"text": []
} |
5709aa1f200fba1400368235 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Who are Rescator? | {
"answer_start": [
18
],
"text": [
"a Russian/Ukrainian hacking ring"
]
} |
5709aa1f200fba1400368236 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What was stolen from Target Corporation computers in 2013? | {
"answer_start": [
137
],
"text": [
"40 million credit cards"
]
} |
5709aa1f200fba1400368237 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | How many credit card numbers were stole from Home Depot in 2014? | {
"answer_start": [
210
],
"text": [
"between 53 and 56 million"
]
} |
5709aa1f200fba1400368238 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What machines were involved in the physical security breaches that played a large role in the incident? | {
"answer_start": [
349
],
"text": [
"self checkout machines"
]
} |
5709aa1f200fba1400368239 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Who is Jim Walter? | {
"answer_start": [
503
],
"text": [
"director of threat intelligence operations at security technology company McAfee"
]
} |
5a55742a134fea001a0e1a96 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What was done when credit cards were stolen? | {
"answer_start": [],
"text": []
} |
5a55742a134fea001a0e1a97 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What was the main breach? | {
"answer_start": [],
"text": []
} |
5a55742a134fea001a0e1a98 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Who could have easily stopped the hacking? | {
"answer_start": [],
"text": []
} |
5a55742a134fea001a0e1a99 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Unsophisticated malware was used on what? | {
"answer_start": [],
"text": []
} |
5a55742a134fea001a0e1a9a | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Why was the malware uninteresting? | {
"answer_start": [],
"text": []
} |
5a5ce6645e8782001a9d5e0e | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Who was the leader of Rescator? | {
"answer_start": [],
"text": []
} |
5a5ce6645e8782001a9d5e0f | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | What was stolen from McAfee? | {
"answer_start": [],
"text": []
} |
5a5ce6645e8782001a9d5e10 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | When was the investigation concluded? | {
"answer_start": [],
"text": []
} |
5a5ce6645e8782001a9d5e11 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | Why weren't the companies warned about the threat? | {
"answer_start": [],
"text": []
} |
5a5ce6645e8782001a9d5e12 | Computer_security | In 2013 and 2014, a Russian/Ukrainian hacking ring known as "Rescator" broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards, and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers. Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing. | When was Rescator formed? | {
"answer_start": [],
"text": []
} |
5709aacc200fba140036823f | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | What does NCAZ stand for? | {
"answer_start": [
179
],
"text": [
"Nationales Cyber-Abwehrzentrum"
]
} |
5709aacc200fba1400368240 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | What does NCAZ take care of? | {
"answer_start": [
622
],
"text": [
"national security aspects"
]
} |
5709aacc200fba1400368241 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | When was NCAZ opened? | {
"answer_start": [
52
],
"text": [
"June 16, 2011"
]
} |
5709aacc200fba1400368242 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Whan was NCAZ founded? | {
"answer_start": [
727
],
"text": [
"February 23, 2011"
]
} |
5709aacc200fba1400368243 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | What is the purpose of NCAZ? | {
"answer_start": [
749
],
"text": [
"to detect and prevent attacks against the national infrastructure"
]
} |
5a557a6e134fea001a0e1adc | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Why does Berlin start a National Cyber Defense Initiative? | {
"answer_start": [],
"text": []
} |
5a557a6e134fea001a0e1add | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Why does NCAZ work closely with BSI? | {
"answer_start": [],
"text": []
} |
5a557a6e134fea001a0e1ade | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Who takes care of national security? | {
"answer_start": [],
"text": []
} |
5a557a6e134fea001a0e1adf | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | What incidents are it to prevent? | {
"answer_start": [],
"text": []
} |
5a557a6e134fea001a0e1ae0 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | What was the Stuxnet incident? | {
"answer_start": [],
"text": []
} |
5a5d037f5e8782001a9d5e5c | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Where is the German Minister for Home Affairs located? | {
"answer_start": [],
"text": []
} |
5a5d037f5e8782001a9d5e5d | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | When did the incident in Stuxnet happen? | {
"answer_start": [],
"text": []
} |
5a5d037f5e8782001a9d5e5e | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Where is the BSI located? | {
"answer_start": [],
"text": []
} |
5a5d037f5e8782001a9d5e5f | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | Who opened the BDN? | {
"answer_start": [],
"text": []
} |
5a5d037f5e8782001a9d5e60 | Computer_security | Berlin starts National Cyber Defense Initiative: On June 16, 2011, the German Minister for Home Affairs, officially opened the new German NCAZ (National Center for Cyber Defense) Nationales Cyber-Abwehrzentrum located in Bonn. The NCAZ closely cooperates with BSI (Federal Office for Information Security) Bundesamt für Sicherheit in der Informationstechnik, BKA (Federal Police Organisation) Bundeskriminalamt (Deutschland), BND (Federal Intelligence Service) Bundesnachrichtendienst, MAD (Military Intelligence Service) Amt für den Militärischen Abschirmdienst and other national organisations in Germany taking care of national security aspects. According to the Minister the primary task of the new organisation founded on February 23, 2011, is to detect and prevent attacks against the national infrastructure and mentioned incidents like Stuxnet. | What is the primary task of the Minister for Home Affairs? | {
"answer_start": [],
"text": []
} |
57097eaced30961900e84218 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | What is the approach to Judiasm that subscribes to a tradition of mass revelation? | {
"answer_start": [
0
],
"text": [
"Orthodox"
]
} |
57097eaced30961900e84219 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | What is the name of the book that has the laws and ethics for Orthodox Judaism? | {
"answer_start": [
185
],
"text": [
"Torah"
]
} |
57097eaced30961900e8421a | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | what texts were legislated by the Tanarim and Amoraim? | {
"answer_start": [
212
],
"text": [
"Talmudic"
]
} |
57097eaced30961900e8421b | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | What besides Modern Orthodox Judaism does Orthodox Judaism consist of? | {
"answer_start": [
478
],
"text": [
"Haredi Judaism"
]
} |
57097eaced30961900e8421c | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | Orthodox Judaism is a self-identification that distinguishes it from what? | {
"answer_start": [
777
],
"text": [
"pre-modern Judaism"
]
} |
5a578a88770dc0001aeefc62 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | What is Orthodox Christianity a religion that subscribes to? | {
"answer_start": [],
"text": []
} |
5a578a88770dc0001aeefc63 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | What does Orthodox Christianity adhere to? | {
"answer_start": [],
"text": []
} |
5a578a88770dc0001aeefc64 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | Who is the Bible legislated by? | {
"answer_start": [],
"text": []
} |
5a578a88770dc0001aeefc65 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | Where will you not find Modern Judaism? | {
"answer_start": [],
"text": []
} |
5a578a88770dc0001aeefc66 | Orthodox_Judaism | Orthodox Judaism is the approach to religious Judaism which subscribes to a tradition of mass revelation and adheres to the interpretation and application of the laws and ethics of the Torah as legislated in the Talmudic texts by the Tanaim and Amoraim. These texts were subsequently developed and applied by later authorities, known as the Gaonim, Rishonim, and Acharonim. Orthodox Judaism generally includes Modern Orthodox Judaism (אורתודוקסיה מודרנית) and Ultra-Orthodox or Haredi Judaism (יהדות חרדית), but complete within is a wide range of philosophies. Although Orthodox Judaism would probably be considered the mainstream expression of Judaism prior to the 19th century, for some Orthodox Judaism is a modern self-identification that distinguishes it from traditional pre-modern Judaism. | What is a religion with a single philosophy? | {
"answer_start": [],
"text": []
} |
57097f32ed30961900e84222 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | What is the global Jewish news service known as? | {
"answer_start": [
164
],
"text": [
"JTA"
]
} |
57097f32ed30961900e84223 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | What is New Jersey's largest daily paper? | {
"answer_start": [
205
],
"text": [
"the Star-Ledger"
]
} |
57097f32ed30961900e84224 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | What term do media entities refrain from using? | {
"answer_start": [
98
],
"text": [
"\"ultra-Orthodox"
]
} |
57097f32ed30961900e84225 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | Who is the spiritual leader of Temple Israel Community Center? | {
"answer_start": [
474
],
"text": [
"Rabbi Shammai Engelmayer"
]
} |
57097f32ed30961900e84226 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | Where is the Temple Israel Community Center located? | {
"answer_start": [
554
],
"text": [
"Cliffside Park"
]
} |
5a578a9d770dc0001aeefc6c | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | What did the New England press association claim? | {
"answer_start": [],
"text": []
} |
5a578a9d770dc0001aeefc6d | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | How large is the global Jewish news service? | {
"answer_start": [],
"text": []
} |
5a578a9d770dc0001aeefc6e | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | The Religion Newswriters Association was the first news source to drop what name? | {
"answer_start": [],
"text": []
} |
5a578a9d770dc0001aeefc6f | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | What is a New York paper still using the term ultra-orthodox? | {
"answer_start": [],
"text": []
} |
5a578a9d770dc0001aeefc70 | Orthodox_Judaism | According to the New Jersey Press Association, several media entities refrain from using the term "ultra-Orthodox", including the Religion Newswriters Association; JTA, the global Jewish news service; and the Star-Ledger, New Jersey’s largest daily newspaper. The Star-Ledger was the first mainstream newspaper to drop the term. Several local Jewish papers, including New York's Jewish Week and Philadelphia's Jewish Exponent have also dropped use of the term. According to Rabbi Shammai Engelmayer, spiritual leader of Temple Israel Community Center in Cliffside Park and former executive editor of Jewish Week, this leaves "Orthodox" as "an umbrella term that designates a very widely disparate group of people very loosely tied together by some core beliefs." | Who was the executive editor of the Star-Ledger? | {
"answer_start": [],
"text": []
} |
5709806e200fba14003680a5 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What is the name of the movement that comporises a fairly broad spectrum of distinct but related philosophies? | {
"answer_start": [
0
],
"text": [
"Modern Orthodoxy"
]
} |
5709806e200fba14003680a6 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What integrity is orthodox judaism trying to preserve? | {
"answer_start": [
675
],
"text": [
"halakha"
]
} |
5709806e200fba14003680a7 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | Who does Modern Orthodoxy assign a central role to? | {
"answer_start": [
847
],
"text": [
"People of Israel"
]
} |
5709806e200fba14003680a8 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What kind of work does orthodox Judiasm seek to transform the world with? | {
"answer_start": [
559
],
"text": [
"Divine work"
]
} |
5709806e200fba14003680a9 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What is modern cutlture in conflict with? | {
"answer_start": [
742
],
"text": [
"Torah"
]
} |
5a57b8de770dc0001aeefcf0 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What comprises a fairly narrow spectrum of movements? | {
"answer_start": [],
"text": []
} |
5a57b8de770dc0001aeefcf1 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What are distinct and non-related in Modern Orthodoxy? | {
"answer_start": [],
"text": []
} |
5a57b8de770dc0001aeefcf2 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What does Classical Orthodoxy hold to be true? | {
"answer_start": [],
"text": []
} |
5a57b8de770dc0001aeefcf3 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | What can Orthodox Judaism be harmed by it's interaction with? | {
"answer_start": [],
"text": []
} |
5a57b8de770dc0001aeefcf4 | Orthodox_Judaism | Modern Orthodoxy comprises a fairly broad spectrum of movements, each drawing on several distinct though related philosophies, which in some combination have provided the basis for all variations of the movement today. In general, Modern Orthodoxy holds that Jewish law is normative and binding, while simultaneously attaching a positive value to interaction with contemporary society. In this view, Orthodox Judaism can "be enriched" by its intersection with modernity; further, "modern society creates opportunities to be productive citizens engaged in the Divine work of transforming the world to benefit humanity". At the same time, in order to preserve the integrity of halakha, any area of "powerful inconsistency and conflict" between Torah and modern culture must be avoided. Modern Orthodoxy, additionally, assigns a central role to the "People of Israel". | Who do Modern Orthodoxy assign a non-central role to? | {
"answer_start": [],
"text": []
} |
570980f2200fba14003680c1 | Orthodox_Judaism | Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orthodox men wear a skullcap known as a kipa and often fringes called "tzitzit". Haredi men often grow beards and always wear black hats and suits, indoors and outdoors. However, Modern Orthodox Jews are commonly indistinguishable in their dress from those around them. | How do orthodox women dress mosly? | {
"answer_start": [
151
],
"text": [
"covered"
]
} |
570980f2200fba14003680c2 | Orthodox_Judaism | Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orthodox men wear a skullcap known as a kipa and often fringes called "tzitzit". Haredi men often grow beards and always wear black hats and suits, indoors and outdoors. However, Modern Orthodox Jews are commonly indistinguishable in their dress from those around them. | what part of their body do married women cover with a scarf? | {
"answer_start": [
200
],
"text": [
"hair"
]
} |
570980f2200fba14003680c3 | Orthodox_Judaism | Externally, Orthodox Jews can be identified by their manner of dress and family lifestyle. Orthodox women dress modestly by keeping most of their skin covered. Additionally, married women cover their hair, most commonly in the form of a scarf, also in the form of hats, bandanas, berets, snoods or, sometimes, wigs. Orthodox men wear a skullcap known as a kipa and often fringes called "tzitzit". Haredi men often grow beards and always wear black hats and suits, indoors and outdoors. However, Modern Orthodox Jews are commonly indistinguishable in their dress from those around them. | What is the Skullcap that orthodox men wear known as? | {
"answer_start": [
356
],
"text": [
"kipa"
]
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.