Input: Article: There are 29 isotopes of copper. 63Cu and 65Cu are stable, with 63Cu comprising approximately 69% of naturally occurring copper; they both have a spin of 3⁄2. The other isotopes are radioactive, with the most stable being 67Cu with a half-life of 61.83 hours. Seven metastable isotopes have been characterized, with 68mCu the longest-lived with a half-life of 3.8 minutes. Isotopes with a mass number above 64 decay by β−, whereas those with a mass number below 64 decay by β+. 64Cu, which has a half-life of 12.7 hours, decays both ways.

Now answer this question: Which isotope makes up about 69% of natural copper?

Output: 63Cu

Input: Article: After World War I, when Britain and France divided up the Middle East's countries, apart from Turkey, between them, pursuant to the Sykes-Picot agreement—in violation of solemn wartime promises of postwar Arab autonomy—there came an immediate reaction: the Muslim Brotherhood emerged in Egypt, the House of Saud took over the Hijaz, and regimes led by army officers came to power in Iran and Turkey. "[B]oth illiberal currents of the modern Middle East," writes de Bellaigne, "Islamism and militarism, received a major impetus from Western empire-builders." As often happens in countries undergoing social crisis, the aspirations of the Muslim world's translators and modernizers, such as Muhammad Abduh, largely had to yield to retrograde currents.

Now answer this question: What was the dividing up of the Middle Eastern countries in violation of?

Output: solemn wartime promises of postwar Arab autonomy

Input: Article: However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". The primary obstacle to effective eradication of cyber crime could be traced to excessive reliance on firewalls and other automated "detection" systems. Yet it is basic evidence gathering by using packet capture appliances that puts criminals behind bars.

Now answer this question: Electronic theft of data is causing more loss than what? 

Output:
physical stealing of assets