Input: Architecture
Nunzia Rondanini stated, "Through its aesthetic dimension architecture goes beyond the functional aspects that it has in common with other human sciences. Through its own particular way of expressing values, architecture can stimulate and influence social life without presuming that, in and of itself, it will promote social development.'

What shouldn't architecture be assumed to promote, according to Rondanini?
Output: social development

Input: Szlachta
In Ruthenia the nobility gradually gravitated its loyalty towards the multicultural and multilingual Grand Duchy of Lithuania after the principalities of Halych and Volhynia became a part of it. Many noble Ruthenian families intermarried with Lithuanian ones.

What eventually became a part of the grand duchy of lithuania?
Output: principalities of Halych and Volhynia

Input: Royal Dutch Shell
On 16 March 2012, 52 Greenpeace activists from five different countries boarded Fennica and Nordica, multipurpose icebreakers chartered to support Shell's drilling rigs near Alaska. Around the same time period, a reporter for Fortune magazine spoke with Edward Itta, an Inupiat Eskimo leader and the former mayor of the North Slope Borough, who expressed that he was conflicted about Shell's plans in the Arctic, as he was very concerned that an oil spill could destroy the Inupiat Eskimo's hunting-and-fishing culture, but his borough also received major tax revenue from oil and gas production; additionally, further revenue from energy activity was considered crucial to the future of the living standard in Itta's community.

How many countries did the group of Greenpeace activists represent?
Output: five

Input: Computer security
China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and military fields as related to network security and information technology strategy, planning and major macroeconomic policy are being researched. The promotion of national network security and information technology law are constantly under study for enhanced national security capabilities.

What is the reason for studying the promotion of national network security ad information technology law?
Output:
enhanced national security capabilities.