lewtun's picture
lewtun HF staff
Refactor submission instructions
2dcd69b
raw
history blame
5.88 kB
ID,Label
50,doesn't mention a harmful application
51,mentions a harmful application
52,doesn't mention a harmful application
53,mentions a harmful application
54,mentions a harmful application
55,doesn't mention a harmful application
56,doesn't mention a harmful application
57,doesn't mention a harmful application
58,doesn't mention a harmful application
59,mentions a harmful application
60,mentions a harmful application
61,doesn't mention a harmful application
62,doesn't mention a harmful application
63,mentions a harmful application
64,mentions a harmful application
65,doesn't mention a harmful application
66,doesn't mention a harmful application
67,mentions a harmful application
68,doesn't mention a harmful application
69,doesn't mention a harmful application
70,mentions a harmful application
71,mentions a harmful application
72,doesn't mention a harmful application
73,doesn't mention a harmful application
74,mentions a harmful application
75,mentions a harmful application
76,mentions a harmful application
77,doesn't mention a harmful application
78,mentions a harmful application
79,mentions a harmful application
80,doesn't mention a harmful application
81,doesn't mention a harmful application
82,doesn't mention a harmful application
83,mentions a harmful application
84,mentions a harmful application
85,doesn't mention a harmful application
86,mentions a harmful application
87,doesn't mention a harmful application
88,mentions a harmful application
89,mentions a harmful application
90,doesn't mention a harmful application
91,mentions a harmful application
92,mentions a harmful application
93,mentions a harmful application
94,mentions a harmful application
95,mentions a harmful application
96,doesn't mention a harmful application
97,doesn't mention a harmful application
98,mentions a harmful application
99,mentions a harmful application
100,doesn't mention a harmful application
101,doesn't mention a harmful application
102,doesn't mention a harmful application
103,mentions a harmful application
104,mentions a harmful application
105,mentions a harmful application
106,mentions a harmful application
107,doesn't mention a harmful application
108,doesn't mention a harmful application
109,doesn't mention a harmful application
110,mentions a harmful application
111,doesn't mention a harmful application
112,mentions a harmful application
113,mentions a harmful application
114,doesn't mention a harmful application
115,mentions a harmful application
116,mentions a harmful application
117,mentions a harmful application
118,doesn't mention a harmful application
119,mentions a harmful application
120,doesn't mention a harmful application
121,doesn't mention a harmful application
122,doesn't mention a harmful application
123,mentions a harmful application
124,doesn't mention a harmful application
125,doesn't mention a harmful application
126,mentions a harmful application
127,doesn't mention a harmful application
128,mentions a harmful application
129,mentions a harmful application
130,doesn't mention a harmful application
131,doesn't mention a harmful application
132,mentions a harmful application
133,doesn't mention a harmful application
134,mentions a harmful application
135,mentions a harmful application
136,doesn't mention a harmful application
137,mentions a harmful application
138,mentions a harmful application
139,mentions a harmful application
140,doesn't mention a harmful application
141,mentions a harmful application
142,doesn't mention a harmful application
143,mentions a harmful application
144,doesn't mention a harmful application
145,mentions a harmful application
146,mentions a harmful application
147,doesn't mention a harmful application
148,mentions a harmful application
149,mentions a harmful application
150,doesn't mention a harmful application
151,mentions a harmful application
152,doesn't mention a harmful application
153,mentions a harmful application
154,doesn't mention a harmful application
155,mentions a harmful application
156,doesn't mention a harmful application
157,mentions a harmful application
158,mentions a harmful application
159,mentions a harmful application
160,doesn't mention a harmful application
161,mentions a harmful application
162,doesn't mention a harmful application
163,mentions a harmful application
164,doesn't mention a harmful application
165,doesn't mention a harmful application
166,doesn't mention a harmful application
167,doesn't mention a harmful application
168,doesn't mention a harmful application
169,doesn't mention a harmful application
170,doesn't mention a harmful application
171,doesn't mention a harmful application
172,mentions a harmful application
173,doesn't mention a harmful application
174,mentions a harmful application
175,doesn't mention a harmful application
176,doesn't mention a harmful application
177,mentions a harmful application
178,mentions a harmful application
179,doesn't mention a harmful application
180,mentions a harmful application
181,doesn't mention a harmful application
182,doesn't mention a harmful application
183,mentions a harmful application
184,mentions a harmful application
185,mentions a harmful application
186,doesn't mention a harmful application
187,doesn't mention a harmful application
188,mentions a harmful application
189,mentions a harmful application
190,doesn't mention a harmful application
191,mentions a harmful application
192,doesn't mention a harmful application
193,mentions a harmful application
194,doesn't mention a harmful application
195,doesn't mention a harmful application
196,doesn't mention a harmful application
197,mentions a harmful application
198,mentions a harmful application
199,doesn't mention a harmful application