Problem: Multiracial American:

The figure of the "tragic octoroon" was a stock character of abolitionist literature: a mixed-race woman raised as if a white woman in her white father's household, until his bankruptcy or death has her reduced to a menial position She may even be unaware of her status before being reduced to victimization. The first character of this type was the heroine of Lydia Maria Child's "The Quadroons" (1842), a short story. This character allowed abolitionists to draw attention to the sexual exploitation in slavery and, unlike portrayals of the suffering of the field hands, did not allow slaveholders to retort that the sufferings of Northern mill hands were no easier. The Northern mill owner would not sell his own children into slavery.

What was a mixed-race woman raised as a black woman in her black father's household called?
---
A: unanswerable


Problem: In 2011, a Welsh club participated in the Premier League for the first time after Swansea City gained promotion. The first Premier League match to be played outside England was Swansea City's home match at the Liberty Stadium against Wigan Athletic on 20 August 2011. In 2012–13, Swansea qualified for the Europa League by winning the League Cup. The number of Welsh clubs in the Premier League increased to two for the first time in 2013–14, as Cardiff City gained promotion, but Cardiff City was relegated after its maiden season.
When was Swansea City's home match played against Wigan Athletic?
---
Answer: Swansea City's home match at the Liberty Stadium against Wigan Athletic on 20 August 2011.


Q: What is a question about this article? If the question is unanswerable, say "unanswerable".
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach.
What is the name of the malware that affects activity trackers?
A: unanswerable


Context and question: In response to organized crime, on August 25, 1953, the FBI created the Top Hoodlum Program. The national office directed field offices to gather information on mobsters in their territories and to report it regularly to Washington for a centralized collection of intelligence on racketeers. After the Racketeer Influenced and Corrupt Organizations Act, or RICO Act, took effect, the FBI began investigating the former Prohibition-organized groups, which had become fronts for crime in major cities and small towns. All of the FBI work was done undercover and from within these organizations, using the provisions provided in the RICO Act. Gradually the agency dismantled many of the groups. Although Hoover initially denied the existence of a National Crime Syndicate in the United States, the Bureau later conducted operations against known organized crime syndicates and families, including those headed by Sam Giancana and John Gotti. The RICO Act is still used today for all organized crime and any individuals who might fall under the Act.
Is the RICO Act still used today?
Answer: The RICO Act is still used


Question: Unarmed fox hunting on horseback with hounds is the type of hunting most closely associated with the United Kingdom; in fact, "hunting" without qualification implies fox hunting. What in other countries is called "hunting" is called "shooting" (birds) or "stalking" (deer) in Britain. Originally a form of vermin control to protect livestock, fox hunting became a popular social activity for newly wealthy upper classes in Victorian times and a traditional rural activity for riders and foot followers alike. Similar to fox hunting in many ways is the chasing of hares with hounds. Pairs of Sight hounds (or long-dogs), such as greyhounds, may be used to pursue a hare in coursing, where the greyhounds are marked as to their skill in coursing the hare (but are not intended to actually catch it), or the hare may be pursued with scent hounds such as beagles or harriers. Other sorts of foxhounds may also be used for hunting stags (deer) or mink. Deer stalking with rifles is carried out on foot without hounds, using stealth.
Is there an answer to this question: Why were foxes originally hunted?

Answer: form of vermin control to protect livestock


Q: What is a question about this article? If the question is unanswerable, say "unanswerable".
Very small lamps may have the filament support wires extended through the base of the lamp, and can be directly soldered to a printed circuit board for connections. Some reflector-type lamps include screw terminals for connection of wires. Most lamps have metal bases that fit in a socket to support the lamp and conduct current to the filament wires. In the late 19th century, manufacturers introduced a multitude of incompatible lamp bases. General Electric introduced standard base sizes for tungsten incandescent lamps under the Mazda trademark in 1909. This standard was soon adopted across the US, and the Mazda name was used by many manufacturers under license through 1945. Today most incandescent lamps for general lighting service use an Edison screw in candelabra, intermediate, or standard or mogul sizes, or double contact bayonet base. Technical standards for lamp bases include ANSI standard C81.67 and IEC standard 60061-1 for common commercial lamp sizes, to ensure interchangeablitity between different manufacturer's products. Bayonet base lamps are frequently used in automotive lamps to resist loosening due to vibration. A bipin base is often used for halogen or reflector lamps.
What year was the Mazda trademark rejected?
A:
unanswerable