Input: Read this: Besides Prince William and Prince Harry, members of the extended British Royal Family who have attended Eton include Prince Richard, Duke of Gloucester and his son Alexander Windsor, Earl of Ulster; Prince Edward, Duke of Kent, his eldest son George Windsor, Earl of St Andrews and grandson Edward Windsor, Lord Downpatrick and his youngest son Lord Nicholas Windsor; Prince Michael of Kent and his son Lord Frederick Windsor; James Ogilvy, son of Princess Alexandra and the Right Honourable Angus Ogilvy, himself an Eton alumnus. Prince William of Gloucester (1942-1972) also attended Eton, as did George Lascelles, 7th Earl of Harewood, son of Princess Mary, Princess Royal.
Question: What school did Princess Mary, Princess Royal attend?

Output: unanswerable


Input: Read this: Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment controlled by computers not connected to the Internet can be vulnerable to physical damage caused by malicious commands sent to industrial equipment (in that case uranium enrichment centrifuges) which are infected via removable media. In 2014, the Computer Emergency Readiness Team, a division of the Department of Homeland Security, investigated 79 hacking incidents at energy companies.
Question: Can computers not attached to the internet be attack by a virus?

Output: unanswerable


Input: Read this: While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, intrusion-aware cases, drive locks, disabling USB ports, and mobile-enabled access may be considered more secure due to the physical access (or sophisticated backdoor access) required in order to be compromised. Each of these is covered in more detail below.
Question: What can hardware be a source of?

Output: insecurity


Input: Read this: In early 2001, Apple began shipping computers with CD-RW drives and emphasized the Mac's ability to play DVDs by including DVD-ROM and DVD-RAM drives as standard. Steve Jobs admitted that Apple had been "late to the party" on writable CD technology, but felt that Macs could become a "digital hub" that linked and enabled an "emerging digital lifestyle". Apple would later introduce an update to its iTunes music player software that enabled it to burn CDs, along with a controversial "Rip, Mix, Burn" advertising campaign that some felt encouraged media piracy. This accompanied the release of the iPod, Apple's first successful handheld device. Apple continued to launch products, such as the unsuccessful Power Mac G4 Cube, the education-oriented eMac, and the titanium (and later aluminium) PowerBook G4 laptop for professionals.
Question: What did Apple begin offering as standard features meant for playing DVD's?

Output:
DVD-ROM and DVD-RAM drives