answersLogoWhite

0


Best Answer

Armed forces

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What method did the British East India Company use to secure its monopoly?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does the company Confidential Shredding do?

The Confidential Shredding company provides a secure, reliable method for destroying sensitive documents. Confidential Shredding company was established in 1998.


Who is the secure in post and get method?

Post is more secure method in forms. It does not supply the form information in the URL.


What method of authentication requires a smart card and a PIN to provide more secure access to company resources?

two-factore authentication


Is http post method equal to https method?

No, they are not equal in any way. HTTPS is more secure than the post method.


Why did the British pass tea act?

The primary purpose of the Tea Act was to increase the profitability of the East India Company to its stockholders (which included the King and the wealthy elite that kept him secure in power) and to help the Company drive its colonial small-business competitors out of business. Because the Company no longer had to pay high taxes to England and held a monopoly on the tea it sold in the American colonies, it was able to lower its tea prices to undercut the prices of the local importers and the mom-and-pop tea merchants and tea houses in every town in America.


What type of service is Secure Horizon?

Secure Horizon is now known as UnitedHealthcare. Secure Horizon is a medical insurance company; plans for medicare are offered through a company called AARP.


What is shared monopoly?

Shared or Joint monopoly refers to anticompetitive behaviour by firms, normally an oligopoly, in order to secure monopoly profits for the firms as a group. Essentially, shared monopoly requires some form of collusion but stops short of being a formal cartel. It is therefore similar to tacit collusion. In a shared monopoly firms may not compete for the same customers and have instead local monopolies.


Where can you download monopoly full version game for free?

There is no absolutely secure source for a free PC version, as it is copyrighted.


Why the British marched towards concord?

because to secure a solider


Who acquired the company CipherTrust?

The company CipherTrust was bought by the Secure Computing Corp. in 2006, which was eventually bought by Mc Afee in 2008. So technically the Secure Computing Corp has acquired the company CipherTrust, but Mc Afee acquired the Secure Computing Corp two years after that.


What does ssh in Linux stsnds for?

SSH stands for Secure Shell. (Often shown as Secure SHell.) It is a secure method for a host computer to connect to a remote computer on the network or over the internet.


Who acquired the company Secure Computing?

Secure Computer also known as SCC, in the beginning was a public computer security company. The security company McAffee aquired SCC fairly recently in the year 2008.