id
stringlengths 40
40
| title
stringlengths 3
59
| context
stringlengths 152
3.36k
| question
stringlengths 1
296
| answers
sequence | metadata
dict |
---|---|---|---|---|---|
ec60cfe96c2b4664b53582cd4fc598c81ebf3107 | Federal_Bureau_of_Investigation | The Criminal Justice Information Services (CJIS) Division, is located in Clarksburg, West Virginia. Organized beginning in 1991, the office opened in 1995 as the youngest agency division. The complex is the length of three football fields. It provides a main repository for information in various data systems. Under the roof of the CJIS are the programs for the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), Fingerprint Identification, Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS). Many state and local agencies use these data systems as a source for their own investigations and contribute to the database using secure communications. FBI provides these tools of sophisticated identification and information services to local, state, federal, and international law enforcement agencies. | How is the complex helpful to criminal justice agencies? | {
"text": [
"Many state and local agencies use these data systems as a source for their own investigations and contribute to the database using secure communications"
],
"answer_start": [
597
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
83374e80e9e313d14b47f42a333ee5e0ff31d483 | Federal_Bureau_of_Investigation | The Criminal Justice Information Services (CJIS) Division, is located in Clarksburg, West Virginia. Organized beginning in 1991, the office opened in 1995 as the youngest agency division. The complex is the length of three football fields. It provides a main repository for information in various data systems. Under the roof of the CJIS are the programs for the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), Fingerprint Identification, Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS). Many state and local agencies use these data systems as a source for their own investigations and contribute to the database using secure communications. FBI provides these tools of sophisticated identification and information services to local, state, federal, and international law enforcement agencies. | When was the CJIS created | {
"text": [
"1991"
],
"answer_start": [
123
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4ac58396c325850f94e7403235a74d52fc6efe57 | Federal_Bureau_of_Investigation | The Criminal Justice Information Services (CJIS) Division, is located in Clarksburg, West Virginia. Organized beginning in 1991, the office opened in 1995 as the youngest agency division. The complex is the length of three football fields. It provides a main repository for information in various data systems. Under the roof of the CJIS are the programs for the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), Fingerprint Identification, Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS). Many state and local agencies use these data systems as a source for their own investigations and contribute to the database using secure communications. FBI provides these tools of sophisticated identification and information services to local, state, federal, and international law enforcement agencies. | Where is the CJIS | {
"text": [
"Clarksburg, West Virginia"
],
"answer_start": [
73
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
f019f097b06ca76dd0d745d4136081de90a77be7 | Federal_Bureau_of_Investigation | The Criminal Justice Information Services (CJIS) Division, is located in Clarksburg, West Virginia. Organized beginning in 1991, the office opened in 1995 as the youngest agency division. The complex is the length of three football fields. It provides a main repository for information in various data systems. Under the roof of the CJIS are the programs for the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), Fingerprint Identification, Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS). Many state and local agencies use these data systems as a source for their own investigations and contribute to the database using secure communications. FBI provides these tools of sophisticated identification and information services to local, state, federal, and international law enforcement agencies. | When did CJIS establish a brick and mortar location? | {
"text": [
"1995"
],
"answer_start": [
150
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
93bdeac358df68e683990cdbb5ee6ab673f168ea | Federal_Bureau_of_Investigation | The Criminal Justice Information Services (CJIS) Division, is located in Clarksburg, West Virginia. Organized beginning in 1991, the office opened in 1995 as the youngest agency division. The complex is the length of three football fields. It provides a main repository for information in various data systems. Under the roof of the CJIS are the programs for the National Crime Information Center (NCIC), Uniform Crime Reporting (UCR), Fingerprint Identification, Integrated Automated Fingerprint Identification System (IAFIS), NCIC 2000, and the National Incident-Based Reporting System (NIBRS). Many state and local agencies use these data systems as a source for their own investigations and contribute to the database using secure communications. FBI provides these tools of sophisticated identification and information services to local, state, federal, and international law enforcement agencies. | who uses the CJIS? | {
"text": [
"state and local agencies"
],
"answer_start": [
602
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9138355c4daaa4863aaa1ae8569dacf6548991e6 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | Who was listening to phone calls clandestinely? | {
"text": [
"FBI"
],
"answer_start": [
290
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
29220921af1b717db718c6434ad3222084ae4600 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | what is the first group mentioned? | {
"text": [
"FBI"
],
"answer_start": [
44
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0a7b03d0de7a74ddce43648de041823287162e03 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | Using the paragraph, explain how Congress felt? | {
"text": [
"actions were denounced by members of Congress"
],
"answer_start": [
620
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
16fdb2d5023fd9dc817e63ec7b3b5a2de6557389 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | What did burglars break into the steal files? | {
"text": [
"residential office"
],
"answer_start": [
19
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
45176cc2e3760e6dd8fdadc47c22c7808446ea4b | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | Which ethnic collective was included in the FBI's COINTELPRO program? | {
"text": [
"black student group at a Pennsylvania military college"
],
"answer_start": [
400
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
446ddb116a482960d837a8adab94cd7a0896ac0a | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | Who killed some political activists? | {
"text": [
"FBI"
],
"answer_start": [
290
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
992fa96bc79fa0e88c4977a114b95dea1b2e96cf | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | what is the last state mentioned? | {
"text": [
"Wisconsin"
],
"answer_start": [
502
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
1fdf55edb40d56913e2552e175fcd2c0e3efaf25 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | what was the last event mentioned? | {
"text": [
"phones of some members of Congress, including Boggs, had allegedly been tapped"
],
"answer_start": [
715
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
36dd7053d5fe4ca36c9121ec1d007c4d10d139f8 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | What is another name for the home office that was raided by the Citizens' Commission? | {
"text": [
"residential office"
],
"answer_start": [
19
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3a19adca1ebfa9b1c23695ab464232a6a93efec1 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | what is the last group mentioned? | {
"text": [
"Congress"
],
"answer_start": [
741
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
a99f54772c23021e49e748d903ecd00c53006fa5 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | Who was spying on members of Congress? | {
"text": [
"FBI"
],
"answer_start": [
290
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
71446bf88c70599189947275d380d529cbc5464b | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | What did the group steal? | {
"text": [
"files detailed the FBI's extensive COINTELPRO program"
],
"answer_start": [
271
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
12da878143852bbc307eb460cc2e320b0075da72 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | What did the media find out about what the FBI was doing? | {
"text": [
"investigations into lives of ordinary citizens"
],
"answer_start": [
341
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
16416c3404df3649da6595c72baa7d0145df6424 | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | What did the named newspaper receive? | {
"text": [
"files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens"
],
"answer_start": [
271
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
74f75b13d7db81e0ca2de781643e821f9d5d5c4b | Federal_Bureau_of_Investigation | In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burglarized by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson. The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including a black student group at a Pennsylvania military college and the daughter of Congressman Henry Reuss of Wisconsin. The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of Congress, including House Majority Leader Hale Boggs. The phones of some members of Congress, including Boggs, had allegedly been tapped. | what is the first place mentioned? | {
"text": [
"residential office"
],
"answer_start": [
19
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
1a51dacfbc1c4428826e1fc3297e1a72263490ac | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | Which position came into existence later, DNI or president? | {
"text": [
"DNI"
],
"answer_start": [
607
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
88c8f18ac70e7ac7988cab26816e0ec78adca95a | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | Who is the first person that the director contacts about issues? | {
"text": [
"Director of National Intelligence"
],
"answer_start": [
572
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
55f8023688c15535741e08692468515ec2efff59 | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | Which of the following was not one of the goals of legislation passed in the wake of 9/11: terrorism prevention, day-to-day operations or intelligence reform? | {
"text": [
"day-to-day operations"
],
"answer_start": [
40
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
257b00a6d285f7bb8be054f2e7f299703007c205 | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | Who is the second person to receive information about issues? | {
"text": [
"the President"
],
"answer_start": [
636
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
058fec544f9e4ab27c3e5d4117e2f96ebbf1f6fe | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | When was the President the first to hear of issues? | {
"text": [
"Before the Intelligence Reform and Terrorism Prevention Act"
],
"answer_start": [
297
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
b352b24b8e9aafb15a694d8a01bb51dfa43b0eb9 | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | What caused the President to be second to hear of any issues that arise? | {
"text": [
"the September 11 attacks"
],
"answer_start": [
383
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fe73528d7977ba7a4f9106cb4f7807ff56c6fae5 | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | Who does the FBI director report to? | {
"text": [
"the President"
],
"answer_start": [
447
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
d429269b4a5b5ee5cb41c9edec2d739ddea5a816 | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | After September 11, who briefs the president? | {
"text": [
"Director of National Intelligence"
],
"answer_start": [
572
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
86da8cd1529c1abe37158b5a3053bbe352c5acf6 | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | What is the main thing that the director does? | {
"text": [
"day-to-day operations"
],
"answer_start": [
40
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
1eb6144f4b1751771b636e3fb1b86d9e4262231e | Federal_Bureau_of_Investigation | The FBI director is responsible for the day-to-day operations at the FBI. Along with his deputies, the director makes sure cases and operations are handled correctly. The director also is in charge of making sure the leadership in any one of the FBI field offices is manned with qualified agents. Before the Intelligence Reform and Terrorism Prevention Act was passed in the wake of the September 11 attacks, the FBI director would directly brief the President of the United States on any issues that arise from within the FBI. Since then, the director now reports to the Director of National Intelligence (DNI), who in turn reports to the President. | Which of the following people is higher in status, the FBI director or the president? | {
"text": [
"the President"
],
"answer_start": [
636
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
6d74140a1f2b2bb0a0cfdf64001e44212d8141b4 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | Other than Pedro Albizu Campos, who did the FBI collect info on in the 1930s? | {
"text": [
"his Nationalist political party"
],
"answer_start": [
110
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
90e86e4dfaf42d370904decb191cb2cdc5ccc54d | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | Why might you not have felt safe around Campos? | {
"text": [
"convicted three times in connection with deadly attacks on US government officials"
],
"answer_start": [
173
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
47e91285dcc14d4994339306611489f34d909ec1 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | Why might you not have felt safe around Campos in specific detail? | {
"text": [
"(Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session"
],
"answer_start": [
265
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
7b630126481a3707fc20c92aebe839e1977ca506 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | When was the second attack against US government officials? | {
"text": [
"1950"
],
"answer_start": [
331
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9da8caf9cf7e03e003ebf80563c36354cc91719d | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | what is the last period in time mentioned? | {
"text": [
"1980s"
],
"answer_start": [
665
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3ce99563f970f2e7673056293802b41ec5dd0685 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | what is the first time period mentioned? | {
"text": [
"1930s"
],
"answer_start": [
149
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
09f06ef6af19c70863926a54bb577c3be289d6f3 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | what is the last group mentioned? | {
"text": [
"FBI"
],
"answer_start": [
516
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
04480d30f00c9d7709adf1a507b415e030ab7991 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | What made it possible to learn of the attacks? | {
"text": [
"Freedom of Information Act"
],
"answer_start": [
631
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
e0bc20b184dbfd1dc39793f2a6f2f80445dc0bbe | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | what is the first group mentioned? | {
"text": [
"FBI"
],
"answer_start": [
4
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
bf3d2f65419faed05cae6ca0974ca93155660225 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | What made something that was unknown known? | {
"text": [
"Freedom of Information Act"
],
"answer_start": [
631
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
12f666aa56bec8c2207cc31e5151cc2db7b3b1b7 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | Who collected information on the mastermind of the 1954 assault of the US House of Representatives? | {
"text": [
"The FBI"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0bb066c3f5e4f5bac539339f926263b411e315bd | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | When was the information released to the public? | {
"text": [
"1980s"
],
"answer_start": [
665
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
09bc043d914f98d85bb9299ea329d44ba96f2402 | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | what is the last profession mentioned? | {
"text": [
"Congressman"
],
"answer_start": [
577
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
11c2181e88c67c4aac5019a70083459ddea69f7a | Federal_Bureau_of_Investigation | The FBI also spied upon and collected information on Puerto Rican independence leader Pedro Albizu Campos and his Nationalist political party in the 1930s. Abizu Campos was convicted three times in connection with deadly attacks on US government officials: in 1937 (Conspiracy to overthrow the government of the United States), in 1950 (attempted murder), and in 1954 (after an armed assault on the US House of Representatives while in session; although not present, Abizu Campos was considered the mastermind). The FBI operation was covert and did not become known until U.S. Congressman Luis Gutierrez had it made public via the Freedom of Information Act in the 1980s. | How did the FBI classify the leader's involvement in the crimes? | {
"text": [
"Abizu Campos was considered the mastermind"
],
"answer_start": [
467
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
aa0b579188a0c099c5613df44fa2689a140ce2d7 | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | What is the main, usually foreign crime related to September 11th investigated under the Patriot Act, | {
"text": [
"terrorism"
],
"answer_start": [
491
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
bd4b86f5af35fa13205acf7eaf4bce519ca5c4a9 | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | What is no longer private? | {
"text": [
"library records"
],
"answer_start": [
445
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fb064e062f27af2437bbdda6549f22793d90b738 | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | What provision did the FBI use on Donald Trump's election campaign investigation on some of his advisors. | {
"text": [
"wiretapping"
],
"answer_start": [
76
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0741df2c8424c992182e1a285b47ca3ca32e92dc | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | Who stands the most to lose by the USA Patriot Act? | {
"text": [
"those who are suspected of terrorism"
],
"answer_start": [
464
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
d5d75e02b2712f6581b1bccc7aea5a2e9d45ccfd | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | What is under scrutiny again? | {
"text": [
"library records"
],
"answer_start": [
445
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
f262e85bb4b069a1ef0d1491adfa06fe1306666c | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | Besides wiretapping, looking at one's internet activity, and checking what books a person has checked out of the library, what else does the USA Patriot Act allow? | {
"text": [
"to search a house while the residents are away"
],
"answer_start": [
244
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
bf7017f28730602bef9daa408deef0562b9e9ed5 | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | What allowed the FBI to do something that they hadn't since the 1970s? | {
"text": [
"The USA PATRIOT Act"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
2552dc83fa39dff202d9a432f08167c86292c3c5 | Federal_Bureau_of_Investigation | The USA PATRIOT Act increased the powers allotted to the FBI, especially in wiretapping and monitoring of Internet activity. One of the most controversial provisions of the act is the so-called sneak and peek provision, granting the FBI powers to search a house while the residents are away, and not requiring them to notify the residents for several weeks afterwards. Under the PATRIOT Act's provisions, the FBI also resumed inquiring into the library records of those who are suspected of terrorism (something it had supposedly not done since the 1970s). | Under the Patriot Act, the FBI does not need a warrant to do what on premises. | {
"text": [
"search a house"
],
"answer_start": [
247
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
302c4716095d2c8e29f52ac00d9fdeada3481c7b | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | Which agreement absolves the landowner of work? | {
"text": [
"The FWS"
],
"answer_start": [
462
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
b16c9f0b45966017f063c211d5fa0a2664d949c9 | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What does the first C in CCA mean? | {
"text": [
"Candidate"
],
"answer_start": [
120
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
119f73f7fb0d9445e810fc507981b16942c40c5b | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What does the A in CCA mean? | {
"text": [
"Agreements With Assurances"
],
"answer_start": [
143
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
883aeb66e8ac8720d2301678351383bbd4f98891 | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What agreement governs the unlisted species? | {
"text": [
"The FWS"
],
"answer_start": [
462
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
cc6505539f5c99c574ec7afa7df33393a5f00664 | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What is the responsibility of the landowner? | {
"text": [
"The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA"
],
"answer_start": [
462
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
08c05b1feb4c67ce2ed9f93ab1cad3eac0fa1198 | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What does the second C in "CCA" stand for? | {
"text": [
"Conservation"
],
"answer_start": [
130
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
51945bebcf348ac163ad8ad77c053f9ef13bd68d | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | How do the agreements differ? | {
"text": [
"Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected"
],
"answer_start": [
120
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
f9c6faff028f6351c3a6261ddb07b25909f9bf3a | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What does the second C in CCA mean? | {
"text": [
"Conservation"
],
"answer_start": [
130
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
8ad069bddb1ac12d09f70d0576ad689f79ba7f83 | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What, can we assume, does the A in "CCA" stand for? | {
"text": [
"Agreement"
],
"answer_start": [
27
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
ecfd5fca99efa66f38f44034db608000661eb12a | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | How are private owners drawn to the agreement? | {
"text": [
"incentives"
],
"answer_start": [
226
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
e0b106321061d184668f5dc9a755aea508899e47 | Endangered_Species_Act | The Candidate Conservation Agreement is closely related to the "Safe Harbor" agreement, the main difference is that the Candidate Conservation Agreements With Assurances(CCA) are meant to protect unlisted species by providing incentives to private landowners and land managing agencies to restore, enhance or maintain habitat of unlisted species which are declining and have the potential to become threatened or endangered if critical habitat is not protected. The FWS will then assure that if, in the future the unlisted species becomes listed, the landowner will not be required to do more than already agreed upon in the CCA. | What does the first C in "CCA" stand for? | {
"text": [
"Candidate"
],
"answer_start": [
120
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
e949a7ec5725e10a7fb12d70569d22e1265dad42 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | which commander in chief is mentioned second to last? | {
"text": [
"Clinton"
],
"answer_start": [
730
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
ab6fe2ed9221c226db66f81eab90fa4517258410 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | which commander in chief is mentioned fourth to last? | {
"text": [
"Reagan"
],
"answer_start": [
700
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
481c2318afe0db89ba6ae429f00a9a194430b2e2 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | what is the last period in time mentioned? | {
"text": [
"9/1/06"
],
"answer_start": [
790
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
b6d7da3d1116858ee57db267e28ce62ec69eeea8 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | How long after a species is listed does the Fish and Wildlife Service expect recovery plan completion? | {
"text": [
"three years"
],
"answer_start": [
480
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9a3149722f82250293948cdcfdfee7020385cabf | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | Other than Fish and Wildlife Service, which agency is tasked with creating a recovery plan for endangered species? | {
"text": [
"National Marine Fisheries Service (NMFS)"
],
"answer_start": [
36
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
988b31bb23e960805c74feceb6f0f7a1d106266e | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | As between Reagan and Bush I, was the annual rate of recovery plan completion increased or decreased? | {
"text": [
"increased"
],
"answer_start": [
628
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4f9c842d95b622f91c713031b2181cd31648ade6 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | which commander in chief is mentioned last? | {
"text": [
"Bush II"
],
"answer_start": [
763
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0696087c6ebb88e4d5f34ef8e17c29573deda2a1 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | What piece of legislation governs endanged species? | {
"text": [
"ESA"
],
"answer_start": [
369
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4a8c5bfc95e5d55500b03a2eb4d7ebf95e196965 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | According to the ESA, within how long must a recovery plan be completed? | {
"text": [
"The ESA does not specify when a recovery plan must be completed"
],
"answer_start": [
365
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
377362c165f0d4725b9493b75b6b1b28a9216019 | Endangered_Species_Act | Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) are required to create an Endangered Species Recovery Plan outlining the goals, tasks required, likely costs, and estimated timeline to recover endangered species (i.e., increase their numbers and improve their management to the point where they can be removed from the endangered list). The ESA does not specify when a recovery plan must be completed. The FWS has a policy specifying completion within three years of the species being listed, but the average time to completion is approximately six years. The annual rate of recovery plan completion increased steadily from the Ford administration (4) through Carter (9), Reagan (30), Bush I (44), and Clinton (72), but declined under Bush II (16 per year as of 9/1/06). | what commander in chief is mentioned third to last? | {
"text": [
"Bush I"
],
"answer_start": [
713
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fc65d0959a66353647ba01385e350e7eec2f55b3 | Endangered_Species_Act | The Endangered Species Act of 1973 (ESA; 16 U.S.C. § 1531 et seq.) is one of the few dozens of United States environmental laws passed in the 1970s, and serves as the enacting legislation to carry out the provisions outlined in The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). The ESA was signed into law by President Richard Nixon on December 28, 1973, it was designed to protect critically imperiled species from extinction as a "consequence of economic growth and development untempered by adequate concern and conservation." The U.S. Supreme Court found that "the plain intent of Congress in enacting" the ESA "was to halt and reverse the trend toward species extinction, whatever the cost." The Act is administered by two federal agencies, the United States Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration (NOAA). | Which of the following is not part of the executive branch: President Richard Nixon, NOAA, or the Supreme Court? | {
"text": [
"Supreme Court"
],
"answer_start": [
582
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0ced8a60d2808ca00c6b3f548e276c4814397743 | Endangered_Species_Act | The Endangered Species Act of 1973 (ESA; 16 U.S.C. § 1531 et seq.) is one of the few dozens of United States environmental laws passed in the 1970s, and serves as the enacting legislation to carry out the provisions outlined in The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). The ESA was signed into law by President Richard Nixon on December 28, 1973, it was designed to protect critically imperiled species from extinction as a "consequence of economic growth and development untempered by adequate concern and conservation." The U.S. Supreme Court found that "the plain intent of Congress in enacting" the ESA "was to halt and reverse the trend toward species extinction, whatever the cost." The Act is administered by two federal agencies, the United States Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration (NOAA). | Which of the following is not a federal agency: the FWS, the CITES or the NOAA? | {
"text": [
"CITES"
],
"answer_start": [
313
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
932bd1554fd47132221aede8dcdac8ed68c9aab5 | Endangered_Species_Act | The Endangered Species Act of 1973 (ESA; 16 U.S.C. § 1531 et seq.) is one of the few dozens of United States environmental laws passed in the 1970s, and serves as the enacting legislation to carry out the provisions outlined in The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). The ESA was signed into law by President Richard Nixon on December 28, 1973, it was designed to protect critically imperiled species from extinction as a "consequence of economic growth and development untempered by adequate concern and conservation." The U.S. Supreme Court found that "the plain intent of Congress in enacting" the ESA "was to halt and reverse the trend toward species extinction, whatever the cost." The Act is administered by two federal agencies, the United States Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration (NOAA). | Which of the following cannot be endangered: Fauna, Fish or President Richard Nixon? | {
"text": [
"President Richard Nixon"
],
"answer_start": [
352
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
cb0601aed9c87abe10372b5220177a3c607a1bff | Endangered_Species_Act | The Endangered Species Act of 1973 (ESA; 16 U.S.C. § 1531 et seq.) is one of the few dozens of United States environmental laws passed in the 1970s, and serves as the enacting legislation to carry out the provisions outlined in The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). The ESA was signed into law by President Richard Nixon on December 28, 1973, it was designed to protect critically imperiled species from extinction as a "consequence of economic growth and development untempered by adequate concern and conservation." The U.S. Supreme Court found that "the plain intent of Congress in enacting" the ESA "was to halt and reverse the trend toward species extinction, whatever the cost." The Act is administered by two federal agencies, the United States Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration (NOAA). | Specifically what kind of species does CITES regulate (not just endangered)? | {
"text": [
"Wild Fauna and Flora"
],
"answer_start": [
291
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
5e8345818f8fca59de19e46fee47726aa0ba6414 | Endangered_Species_Act | The Endangered Species Act of 1973 (ESA; 16 U.S.C. § 1531 et seq.) is one of the few dozens of United States environmental laws passed in the 1970s, and serves as the enacting legislation to carry out the provisions outlined in The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). The ESA was signed into law by President Richard Nixon on December 28, 1973, it was designed to protect critically imperiled species from extinction as a "consequence of economic growth and development untempered by adequate concern and conservation." The U.S. Supreme Court found that "the plain intent of Congress in enacting" the ESA "was to halt and reverse the trend toward species extinction, whatever the cost." The Act is administered by two federal agencies, the United States Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration (NOAA). | What do FWS and NOAA regulate? | {
"text": [
"The Endangered Species Act of 1973"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0122c8b96a42033fc62cd3769dfbf6088a63ee45 | Endangered_Species_Act | The Endangered Species Act of 1973 (ESA; 16 U.S.C. § 1531 et seq.) is one of the few dozens of United States environmental laws passed in the 1970s, and serves as the enacting legislation to carry out the provisions outlined in The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). The ESA was signed into law by President Richard Nixon on December 28, 1973, it was designed to protect critically imperiled species from extinction as a "consequence of economic growth and development untempered by adequate concern and conservation." The U.S. Supreme Court found that "the plain intent of Congress in enacting" the ESA "was to halt and reverse the trend toward species extinction, whatever the cost." The Act is administered by two federal agencies, the United States Fish and Wildlife Service (FWS) and the National Oceanic and Atmospheric Administration (NOAA). | What was the purpose of the ESA mentioned in quotes? | {
"text": [
"halt and reverse the trend toward species extinction, whatever the cost"
],
"answer_start": [
666
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
0d0dd49fd20bc3e387c9d3c447e1a4dc92de9688 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What does the C in CPI stand for? | {
"text": [
"Center"
],
"answer_start": [
62
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
c321a1eebb87521ab33ed352f9968ba11796d356 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What does the P stand for in CPI? | {
"text": [
"Public"
],
"answer_start": [
73
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
21db8452bc60a11a89d12f465255e52cfa363c76 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | An increase in what would allow the US Fish and Wildlife Service to catch more dealers who are "donating" exotic animals? | {
"text": [
"staff"
],
"answer_start": [
855
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9d7466d24820ad90e98b89532eeab0ea448c1fb0 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | Which of the following did not publish research in 1999: Alan Green, CPI, or an endangered species specialist? | {
"text": [
"an endangered species specialist"
],
"answer_start": [
736
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
6e983d81a2fdb7e2cd0c81005149ac9b14f2f525 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What does the I in CPI stand for? | {
"text": [
"Integrity"
],
"answer_start": [
80
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
8f047a2a9597ac92dc0df8cebb3df7c52e158a08 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What could the US Fish and Wildlife Service get more of that would allow them to catch more people who are supposedly donating exotic species? | {
"text": [
"staff"
],
"answer_start": [
855
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3ed07e91937931a686e3c8f311a6ad6439130e78 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What does the US Fish and Wildlife Service need more of? | {
"text": [
"staff"
],
"answer_start": [
855
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
678ee5a05a36e97ffa8fb1dbd587332f1aca590d | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What does the I stand for in CPI? | {
"text": [
"Integrity"
],
"answer_start": [
80
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
2689eafc85f58cc96f9198fc7aed201de36c58f0 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | What is not a last name, Green or ESA? | {
"text": [
"ESA"
],
"answer_start": [
394
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
5f6b641b2e81cb5f57c6d3e212584b4dc1440705 | Endangered_Species_Act | According to research published in 1999 by Alan Green and the Center for Public Integrity (CPI), loopholes in the ESA are commonly exploited in the exotic pet trade. Although the legislation prohibits interstate and foreign transactions for list species, no provisions are made for in-state commerce, allowing these animals to be sold to roadside zoos and private collectors. Additionally, the ESA allows listed species to be shipped across state lines as long as they are not sold. According to Green and the CPI, this allows dealers to "donate" listed species through supposed "breeding loans" to anyone, and in return they can legally receive a reciprocal monetary "donation" from the receiving party. Furthermore, an interview with an endangered species specialist at the US Fish and Wildlife Service revealed that the agency does not have sufficient staff to perform undercover investigations, which would catch these false "donations" and other mislabeled transactions. | Which of the following did not publish research in 1999: Alan Green, CPI, or animals? | {
"text": [
"animals"
],
"answer_start": [
316
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
5279873c6392299b2097987e53974d6c406f3b64 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | When did safari end it's alpha testing | {
"text": [
"January 2003"
],
"answer_start": [
45
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
4ba4855be754a4c9ee242849ba12e5671de371dc | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | What happened on the 3rd year of the 21st century? | {
"text": [
"Apple's Safari had its first beta release"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
737526fe95f48c63df9d5bfe431b70f7036d6776 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | What was the case for Apple in the 12th year of the century known as the 2000s? | {
"text": [
"it had a dominant share of Apple-based web browsing"
],
"answer_start": [
77
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
fbd3011d42ad49a79a4defb744c463ee4272ab98 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | What happened in the 3rd year of the 21st century? | {
"text": [
"Apple's Safari had its first beta release"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9df021cede36aca41b0bab28116a1caa7c993823 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | What comes after an alpha release | {
"text": [
"beta"
],
"answer_start": [
29
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
09124b036faddda0e10e54b67c31479524cd50ad | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | By 12th year of the century known as the 2000s, what were Safari's numbers like? | {
"text": [
"accounting for just over 7% of the entire browser market"
],
"answer_start": [
130
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
9e1c590e90c992141cfdb082f6c1b66e16960ae9 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | What was the case by the 11th year of the 21st century? | {
"text": [
"it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market"
],
"answer_start": [
77
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
d19de7330f3f5cef7cfe7ab21948dcbde81db612 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | What accounted for 7 percent of the mentioned market? | {
"text": [
"Apple's Safari"
],
"answer_start": [
0
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
3bb65f46ddbccdd36e6f8a9e31459c72d9709832 | Web_browser | Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant share of Apple-based web browsing, accounting for just over 7% of the entire browser market. | Who uses Safari | {
"text": [
"Apple-based web browsing"
],
"answer_start": [
104
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
1dde01470570918703ce28c0906f4c69485a281e | Web_browser | Today, most commercial web browsers are paid by search engine companies to make their engine default, or to include them as another option. For example, Google pays Mozilla, the maker of Firefox, to make Google Search the default search engine in Firefox. Mozilla makes enough money from this deal that it does not need to charge users for Firefox. In addition, Google Search is also (as one would expect) the default search engine in Google Chrome. Users searching for websites or items on the Internet would be led to Google's search results page, increasing ad revenue and which funds development at Google and of Google Chrome. | For what reason is there an obvious intracompany collaboration in the most well known method of searching the net to ensure the user will always use the company's method of searching in the browser owned by that company? | {
"text": [
"increasing ad revenue and which funds development at Google and of Google Chrome"
],
"answer_start": [
550
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
201a41b77c6c2b0028ad9f1ce0b4f4c93eed1a87 | Web_browser | Today, most commercial web browsers are paid by search engine companies to make their engine default, or to include them as another option. For example, Google pays Mozilla, the maker of Firefox, to make Google Search the default search engine in Firefox. Mozilla makes enough money from this deal that it does not need to charge users for Firefox. In addition, Google Search is also (as one would expect) the default search engine in Google Chrome. Users searching for websites or items on the Internet would be led to Google's search results page, increasing ad revenue and which funds development at Google and of Google Chrome. | What obvious intracompany collaboration in the most well known method of searching the net exists to ensure the user will always use the company's method of searching in the browser owned by that company? | {
"text": [
"Google Search is also (as one would expect) the default search engine in Google Chrome"
],
"answer_start": [
362
]
} | {
"split": "train",
"model_in_the_loop": "Combined"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.