Given a paragraph from a Wikipedia article about some topic, and a question related to the topic, determine whether the question is answerable from the paragraph. If the question is answerable, answer "True", otherwise, answer "False".

Input: Consider Input: The Mesolithic period in the Indian subcontinent was followed by the Neolithic period, when more extensive settlement of the subcontinent occurred after the end of the last Ice Age approximately 12,000 years ago. The first confirmed semipermanent settlements appeared 9,000 years ago in the Bhimbetka rock shelters in modern Madhya Pradesh, India. Early Neolithic culture in South Asia is represented by the Bhirrana findings (7500 BCE) in Haryana, India & Mehrgarh findings (7000–9000 BCE) in Balochistan, Pakistan. Question: What preceeded the Neolithic period?

Output: True


Input: Consider Input: From 2001 to 2008, Mac sales increased continuously on an annual basis. Apple reported worldwide sales of 3.36 million Macs during the 2009 holiday season. As of Mid-2011, the Macintosh continues to enjoy rapid market share increase in the US, growing from 7.3% of all computer shipments in 2010 to 9.3% in 2011. According to IDC's quarterly PC tracker, globally, in 3rd quarter of 2014, Apple's PC market share increased 5.7 percent year over year, with record sales of 5.5 million units. Apple now sits in the number five spot, with a global market share of about 6% during 2014, behind Lenovo, HP, Dell and Acer. Question: Which happened first, John Dvorak discussed rumors of a mysterious "MacIntosh" project or Apple announced the Macintosh 128K?

Output: False


Input: Consider Input: Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. Wifi, Bluetooth, and cell phone network on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. Question: Which of the following is not an example of a sensor: cameras, microphones, or financial account information?
Output: True