1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
3 years ago
15

What other methods might Lin Zexu have used to stop the British opium trade in China

History
1 answer:
natita [175]3 years ago
5 0

Lin Zexu, leading Chinese scholar and official of the Qing (Manchu) dynasty, ... up to the first Opium War (1839–42) between Britain and China. ... he had no idea that his success in stopping the opium trade would only open ... was granted any rights in China that might be granted to other foreign countries).

pls thank me and mark me as brinliest

You might be interested in
How would you compare and contrast President Johnson Justifies U.S. Intervention in Vietnam to Beyond Vietnam: A Time to Break S
Anna007 [38]

Answer:

nee all-out looddmdkdkkddo

5 0
2 years ago
When did the united states enter world war 1?
ollegr [7]
The US Joined efforts in WW1 on <span>April 6, 1917</span>
7 0
3 years ago
Read 2 more answers
What were africa's main exports?
galina1969 [7]

Answer:

  • Palm oil.
  • Gold and diamonds.
  • Oil.
  • Cocoa.
  • Timber.
  • Precious metals.

- Economy Watch

<u>Brainliest Please!!</u>

4 0
2 years ago
Which list states events of Alexander the Great’s conquests in the correct chronological order?
Sauron [17]
I. Alexander attacked Anatolia.
ii. Alexander invaded Egypt.
iii. Alexander conquered Persia.
<span>iv. Alexander returned to Babylon.</span>
3 0
3 years ago
In 1986, recognizing the growth and potential of cybercrime, the u.s. congress passed the _______.
jarptica [38.1K]

In 1986, recognizing the growth and potential of cybercrime, the u.s. congress passed the Computer Fraud and Abuse Act

Computer Fraud and Abuse Act of 1986 - Amends the Federal criminal code to change the scienter requirement from "knowingly" to "intentionally" for certain offenses regarding accessing the computer files of another.

The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.

Cyber laws have been put in place to keep users safe on the internet. This provides internet users with access, privacy, free expression, and jurisdiction.

To know more about  Cyber laws here

brainly.com/question/20768284

#SPJ4

3 0
1 year ago
Other questions:
  • What is Social Darwinism, and how did it lead the US into becoming an Imperialistic nation?
    11·1 answer
  • In 2006, kinky friedman had to collect 45,000 signatures of eligible voters who had not voted in the march 7 primary in order to
    6·1 answer
  • Which describes a reason fifteenth-century Europeans wanted to find a sea passage to East Asia?
    8·2 answers
  • Which resources contributed to Chicago’s growth in the nineteenth century? Select all that apply. highways railroads expressways
    15·2 answers
  • HELP HURRY ASAP PLZ BRAINLIEST
    5·2 answers
  • What happened when revolutionaries overthrew the qing dynasty
    15·1 answer
  • The Allies tried to regain access to _____ in the Battle of Gallipoli
    12·1 answer
  • The Toleration Act of 1649 was established in which colony
    11·1 answer
  • Part B: Which of the following quotes The supports The answer to part B
    11·2 answers
  • Write an essay:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!