ID,Label 50,doesn't mention a harmful application 51,mentions a harmful application 52,doesn't mention a harmful application 53,mentions a harmful application 54,mentions a harmful application 55,doesn't mention a harmful application 56,doesn't mention a harmful application 57,doesn't mention a harmful application 58,doesn't mention a harmful application 59,mentions a harmful application 60,mentions a harmful application 61,doesn't mention a harmful application 62,doesn't mention a harmful application 63,mentions a harmful application 64,mentions a harmful application 65,doesn't mention a harmful application 66,doesn't mention a harmful application 67,mentions a harmful application 68,doesn't mention a harmful application 69,doesn't mention a harmful application 70,mentions a harmful application 71,mentions a harmful application 72,doesn't mention a harmful application 73,doesn't mention a harmful application 74,mentions a harmful application 75,mentions a harmful application 76,mentions a harmful application 77,doesn't mention a harmful application 78,mentions a harmful application 79,mentions a harmful application 80,doesn't mention a harmful application 81,doesn't mention a harmful application 82,doesn't mention a harmful application 83,mentions a harmful application 84,mentions a harmful application 85,doesn't mention a harmful application 86,mentions a harmful application 87,doesn't mention a harmful application 88,mentions a harmful application 89,mentions a harmful application 90,doesn't mention a harmful application 91,mentions a harmful application 92,mentions a harmful application 93,mentions a harmful application 94,mentions a harmful application 95,mentions a harmful application 96,doesn't mention a harmful application 97,doesn't mention a harmful application 98,mentions a harmful application 99,mentions a harmful application 100,doesn't mention a harmful application 101,doesn't mention a harmful application 102,doesn't mention a harmful application 103,mentions a harmful application 104,mentions a harmful application 105,mentions a harmful application 106,mentions a harmful application 107,doesn't mention a harmful application 108,doesn't mention a harmful application 109,doesn't mention a harmful application 110,mentions a harmful application 111,doesn't mention a harmful application 112,mentions a harmful application 113,mentions a harmful application 114,doesn't mention a harmful application 115,mentions a harmful application 116,mentions a harmful application 117,mentions a harmful application 118,doesn't mention a harmful application 119,mentions a harmful application 120,doesn't mention a harmful application 121,doesn't mention a harmful application 122,doesn't mention a harmful application 123,mentions a harmful application 124,doesn't mention a harmful application 125,doesn't mention a harmful application 126,mentions a harmful application 127,doesn't mention a harmful application 128,mentions a harmful application 129,mentions a harmful application 130,doesn't mention a harmful application 131,doesn't mention a harmful application 132,mentions a harmful application 133,doesn't mention a harmful application 134,mentions a harmful application 135,mentions a harmful application 136,doesn't mention a harmful application 137,mentions a harmful application 138,mentions a harmful application 139,mentions a harmful application 140,doesn't mention a harmful application 141,mentions a harmful application 142,doesn't mention a harmful application 143,mentions a harmful application 144,doesn't mention a harmful application 145,mentions a harmful application 146,mentions a harmful application 147,doesn't mention a harmful application 148,mentions a harmful application 149,mentions a harmful application 150,doesn't mention a harmful application 151,mentions a harmful application 152,doesn't mention a harmful application 153,mentions a harmful application 154,doesn't mention a harmful application 155,mentions a harmful application 156,doesn't mention a harmful application 157,mentions a harmful application 158,mentions a harmful application 159,mentions a harmful application 160,doesn't mention a harmful application 161,mentions a harmful application 162,doesn't mention a harmful application 163,mentions a harmful application 164,doesn't mention a harmful application 165,doesn't mention a harmful application 166,doesn't mention a harmful application 167,doesn't mention a harmful application 168,doesn't mention a harmful application 169,doesn't mention a harmful application 170,doesn't mention a harmful application 171,doesn't mention a harmful application 172,mentions a harmful application 173,doesn't mention a harmful application 174,mentions a harmful application 175,doesn't mention a harmful application 176,doesn't mention a harmful application 177,mentions a harmful application 178,mentions a harmful application 179,doesn't mention a harmful application 180,mentions a harmful application 181,doesn't mention a harmful application 182,doesn't mention a harmful application 183,mentions a harmful application 184,mentions a harmful application 185,mentions a harmful application 186,doesn't mention a harmful application 187,doesn't mention a harmful application 188,mentions a harmful application 189,mentions a harmful application 190,doesn't mention a harmful application 191,mentions a harmful application 192,doesn't mention a harmful application 193,mentions a harmful application 194,doesn't mention a harmful application 195,doesn't mention a harmful application 196,doesn't mention a harmful application 197,mentions a harmful application 198,mentions a harmful application 199,doesn't mention a harmful application