In this task, you are given a question and a context passage. You have to answer the question based on the given passage.

[EX Q]: What, in the article, happened 65 years before YSMI was renamed to YSMU?, Context: On the basis of the expansion and development of Yerevan State University a number of higher educational independent Institutions were formed including Medical Institute separated in 1930 which was set up on the basis of medical faculty. In 1980 Yerevan State Medical University was awarded one of the main rewards of the former USSR – the Order of Labor red Banner for training qualified specialists in health care and valuable service in the development of Medical Science. In 1995 YSMI was renamed to YSMU and since 1989 it has been named after Mkhitar Heratsi, the famous medieval doctor. Mkhitar Heratsi was the founder of Armenian Medical school in Cilician Armenia. The great doctor played the same role in Armenian Medical Science as Hippocrates in Western, Galen in Roman, Ibn Sīnā in Arabic medicine.
[EX A]: Medical Institute separated

[EX Q]: Where was the Summer theater?, Context: Nearby, in Ogród Saski (the Saxon Garden), the Summer Theatre was in operation from 1870 to 1939, and in the inter-war period, the theatre complex also included Momus, Warsaw's first literary cabaret, and Leon Schiller's musical theatre Melodram. The Wojciech Bogusławski Theatre (1922–26), was the best example of "Polish monumental theatre". From the mid-1930s, the Great Theatre building housed the Upati Institute of Dramatic Arts – the first state-run academy of dramatic art, with an acting department and a stage directing department.
[EX A]: Ogród Saski

[EX Q]: What does computer security prevent?, Context: Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
[EX A]:
harm that may come via network access, data and code injection, and due to malpractice by operators