Input: Read this: However, the formation of one's identity occurs through one's identifications with significant others (primarily with parents and other individuals during one's biographical experiences, and also with "groups" as they are perceived). These others may be benign - such that one aspires to their characteristics, values and beliefs (a process of idealistic-identification), or malign - when one wishes to dissociate from their characteristics (a process of defensive contra-identification) (Weinreich & Saunderson 2003, Chapter 1, pp 54–61).
Question: Aspiring to others what is malign?

Output: unanswerable


Input: Read this: The expansion of the Rus' put further military and economic pressure on the Khazars, depriving them of territory, tributaries, and trade. In around 890, Oleg waged an indecisive war in the lands of the lower Dniester and Dnieper rivers with the Tivertsi and the Ulichs, who were likely acting as vassals of the Magyars, blocking Rus' access to the Black Sea. In 894, the Magyars and Pechenegs were drawn into the wars between the Byzantines and the Bulgarian Empire. The Byzantines arranged for the Magyars to attack Bulgarian territory from the north, and Bulgaria in turn persuaded the Pechenegs to attack the Magyars from their rear. Boxed in, the Magyars were forced to migrate further west across the Carpathian Mountains into the Hungarian plain, depriving the Khazars of an important ally and a buffer from the Rus'. The migration of the Magyars allowed Rus' access to the Black Sea, and they soon launched excursions into Khazar territory along the sea coast, up the Don river, and into the lower Volga region. The Rus' were raiding and plundering into the Caspian Sea region from 864, with the first large-scale expedition in 913, when they extensively raided Baku, Gilan, Mazandaran and penetrated into the Caucasus.
Question: Who waged a decisive war in 890?

Output: unanswerable


Input: Read this: While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, intrusion-aware cases, drive locks, disabling USB ports, and mobile-enabled access may be considered more secure due to the physical access (or sophisticated backdoor access) required in order to be compromised. Each of these is covered in more detail below.
Question: What is an example of software-only computer security?

Output: unanswerable


Input: Read this: On April 9, 2007, it was announced that Apple had sold its one-hundred millionth iPod, making it the biggest selling digital music player of all time. In April 2007, Apple reported second quarter revenue of US$5.2 billion, of which 32% was made from iPod sales. Apple and several industry analysts suggest that iPod users are likely to purchase other Apple products such as Mac computers.
Question: In which year did Apple top sales of 100,000,000 iPods?

Output:
2007