History of China

History of China
ANCIENT
3 Sovereigns and 5 Emperors (三皇五帝)
Xia Dynasty 2100–1600 BCE (夏朝)
Shang Dynasty 1600–1046 BCE (商朝)
Zhou Dynasty 1045–256 BCE (周朝)
Western Zhou (西周)
Eastern Zhou (东周)
   Spring and Autumn Period (春秋)
   Warring States Period (战国)
IMPERIAL
Qin Dynasty 221 BCE–206 BCE (秦朝)
Han Dynasty 206 BCE–220 CE (汉朝)
  Western Han (西汉)
  Xin Dynasty (新)
  Eastern Han (东汉)
Three Kingdoms 220–280 (三国)
  Wei (魏), Shu (蜀) & Wu (吴)
Jin Dynasty 265–420 (晋朝)
  Western Jin (西晋 ) 16 Kingdoms (十六国)
304–439
  Eastern Jin (东晋)
Southern & Northern Dynasties 420–589 (南北朝)
Sui Dynasty 581–618 (隋朝)
Tang Dynasty 618–907 (唐朝)
  ( Second Zhou 690–705 武周 )
5 Dynasties & 10 Kingdoms
907–960 (五代十国)
Liao Dynasty 907–1125 (辽)
Song Dynasty 960–1279 (宋朝)
  Northern Song (北宋) W. Xia (西夏)
  Southern Song (南宋) Jin (金)
Yuan Dynasty 1271–1368 (元朝)
Ming Dynasty 1368–1644 (明朝)
Qing Dynasty 1644–1911 (清朝)
MODERN
Republic of China 1912–1949 (中华民国)
People’s Republic of China
1949–present (中华人民共和国)
Republic of China
1945–present (中华民国/台湾地区)


8 thoughts on “History of China”

  1. Whole Disk Encryption Each day, millions of people go to online to work, do homework, purchase products, manage devices in their homes, and connect with friends. Technology such as the big information are modifying our everyday life at a quick speed, while exponentially increasing the quantity of private data that is attained, used, and shared.

  2. Full disk encryption is encryption in the hard disk level. This software performs by automatically converting data on a hard drive into a form that can not be comprehended by everybody who doesn’t have the essential to “undo” the conversion. Without the correct authentication essential, even when the difficult hard drive is taken away and used in a different machine, the data remains inaccessible.

  3. Full disk encryption is encryption in the hard disk level. This software performs by automatically converting data on a hard drive into a form that can not be comprehended by everybody who doesn’t have the essential to “undo” the conversion. Without the correct authentication essential, even when the difficult hard drive is taken away and used in a different machine, the data remains inaccessible.

  4. Nice article, If you would like set the access authorities for those files or programs, such as, to hide or lock them, to deny copy or delete etc, and likewise want to monitor their utilization, the File Encryption will probably be your best choice.

  5. Oh it’s right, File Encryption is the best encryption software to encrypt, lock and hide files, folders, drives in a convenient method. This encryption software is compatible with all popular versions of Windows OS

  6. Nice article, If you would like set the access authorities for those files or programs, such as, to hide or lock them, to deny copy or delete etc, and likewise want to monitor their utilization, the File Encryption will probably be your best choice.

Leave a Reply

Your email address will not be published. Required fields are marked *