1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
5

What reforms were made by the British government in India after the war of independence? write any three

Computers and Technology
1 answer:
mixas84 [53]3 years ago
8 0

Answer:

1. Indian Council Act

2. Morely-Minto Reforms

3. Rowlatt Act

Explanation:

Following the unsuccessful war of independence in Indian often referred to as the Indian Rebellion of 1857. There were various reforms established by the British government before the actual independence of India in 1947. Some of the reforms include:

1. Indian Council Act: this was established in 1861 under the regime of Lord Canning. The purpose is to contemplate an association of Indians with the administration at a higher level.

2. Morely-Minto Reforms: this was established in 1909 under the reign of Lord Minto II. The purpose is to Separate electorates to widen the gulf between Hindús and Muslims.

3. Rowlatt Act: this was established in 1919 under the administration of L. Chelmsford. These reforms favor the extraordinary powers given to suppress the freedom struggle with General Dyer as the Commandant.

You might be interested in
In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
emmainna [20.7K]

This idea is most closely related to the Layering in terms of how to reduce complexity.

<h3>Describe cybersecurity?</h3>

The term "cybersecurity" refers to the safeguarding of computer systems and networks against the leakage, theft, or destruction of data as well as the interruption of the services they offer.

Defense in depth is a technique used in cybersecurity that is one of the greatest ways to safeguard a computer or network. If one fails, it's likely that another will identify the issue. The approach to simplifying that is most in line with is called layering.

Thus, This idea is most closely related to the Layering in terms

For further details about cybersecurity, click here:

brainly.com/question/13016321

#SPJ1

5 0
2 years ago
Read 2 more answers
Which fund classification would a focus on only stocks of technology companies match?
Bumek [7]

Answer:

Growth funds

Explanation:

This funds fucos on capital appreciation

5 0
3 years ago
James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
s2008m [1.1K]

Answer:

IP address

Explanation:

In computer networks, every computer has assigned with a unique address that is called logical address or IP address.

This address is assigned by ICANN and used to access that particular computer by other computers on the network.

3 0
4 years ago
How many binary digits are in 10^100.
Basile [38]

Answer:

333 binary digits.

Explanation:

8 0
2 years ago
How to unlock your iphone when you forgot the password?.
Lena [83]

Answer:

go to customer service

Explanation:

5 0
2 years ago
Other questions:
  • How much does a Canon PowerShot G7X cost in America?
    14·1 answer
  • Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
    6·1 answer
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • function calculate () { var s = 2; var x = 2; var y = 3; if (x &gt; 4) { s=s+ 2; } else if ( y &gt; 4) { s=s+ 4; } else { s+=3;}
    11·1 answer
  • How do I give Brainliest? Will give brainliest when I figure out how
    8·2 answers
  • Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula
    8·1 answer
  • WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA
    10·1 answer
  • One friend claims that a dual-core system runs at twice the speed as a single-core system; another friend disagrees by saying th
    13·1 answer
  • The area that we can see just after windows is started is subject​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!