Problem: BeiDou Navigation Satellite System:

In-mid 2015, China started the build-up of the third generation BeiDou system (BDS-3) in the global coverage constellation. The first BDS-3 satellite was launched 30 September 2015. As of March 2016, 4 BDS-3 in-orbit validation satellites have been launched.

Which system did China start building in March of 2017?
---
A: unanswerable


Problem: Currently, international agreements are executed by executive agreement rather than treaties at a rate of 10:1. Despite the relative ease of executive agreements, the President still often chooses to pursue the formal treaty process over an executive agreement in order to gain congressional support on matters that require the Congress to pass implementing legislation or appropriate funds, and those agreements that impose long-term, complex legal obligations on the United States. For example, the deal by the United States, Iran and other countries is not a Treaty.
What is it about the approval process of executive agreements might lead a US president to prefer them over treaties?
---
Answer: the relative ease


Q: What is a question about this article? If the question is unanswerable, say "unanswerable".
However, Eritrea still faces many challenges. Despite number of physicians increasing from only 0.2 in 1993 to 0.5 in 2004 per 1000 population, this is still very low. Malaria and tuberculosis are common in Eritrea. HIV prevalence among the 15–49 group exceeds 2%. The fertility rate is at about 5 births per woman. Maternal mortality dropped by more than half from 1995 to 2002, although the figure is still high. Similarly, between 1995 and 2002, the number of births attended by skilled health personnel has doubled but still is only 28.3%. A major cause of death in neonates is by severe infection. Per capita expenditure on health is low in Eritrea.
What is the fertility rate in Eriterea?
A: 5 births per woman


Context and question: Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network stack (or, in the case of most UNIX-based operating systems such as Linux, built into the operating system kernel) to provide real time filtering and blocking. Another implementation is a so-called physical firewall which consists of a separate machine filtering network traffic. Firewalls are common amongst machines that are permanently connected to the Internet.
What type of machine rarely uses firewalls?
Answer: unanswerable


Question: 
 Russia: On April 5 the Olympic torch arrived at Saint Petersburg, Russia. The length of the torch relay route in the city was 20 km, with the start at the Victory Square and finish at the Palace Square. Mixed martial arts icon and former PRIDE Heavyweight Champion Fedor Emelianenko was one the torch bearers. This gives him the distinction of the being the first active MMA fighter to carry the Olympic flame.
Is there an answer to this question: Where was the start of the torch route in Saint Petersburg?

Answer: Victory Square


Question: Compression is useful because it helps reduce resource usage, such as data storage space or transmission capacity. Because compressed data must be decompressed to use, this extra processing imposes computational or other costs through decompression; this situation is far from being a free lunch. Data compression is subject to a space–time complexity trade-off. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed, and the option to decompress the video in full before watching it may be inconvenient or require additional storage. The design of data compression schemes involves trade-offs among various factors, including the degree of compression, the amount of distortion introduced (when using lossy data compression), and the computational resources required to compress and decompress the data.
Is there an answer to this question: What must compressed data be to be inconvenient?

Answer:
unanswerable