Q:

What are the dates during which the Trojan War took place?

A:

Quick Answer

Historians and archaeologists have placed the Trojan war some time in the 13th century B.C. Because there are so many different accounts of the Trojan War, it is difficult to determine the exact dates on which it took place.

Know More
What are the dates during which the Trojan War took place?
Credit: DEA / G. DAGLI ORTI De Agostini Getty Images

Full Answer

Troy was excavated in 1870 by the German archaeologist Heinrich Schliemann. Since then, extensive studies have estimated that the city met its demise around the year 1250 B.C. In 2008, scientists used evidence through astronomical references in the Odyssey to find the date of Odysseus' return to Greece after the Trojan War. Using Homer's reference to the solar eclipse on the day of Odysseus's arrival, the scientists found that the most likely date would have been April 16, 1178 B.C, which was 10 years after the fall of Troy.


Is this answer helpful?

Similar Questions

  • Q:

    What caused the Trojan War?

    A:

    The Trojan War began when the Trojan Prince Paris kidnapped Helen, the wife of Menelaus, king of Sparta. He was assisted by Aphrodite, who had promised him Helen, the most beautiful woman in the world, as a reward for siding with her in a competition against the goddesses Hera and Athena.

    Full Answer >
    Filed Under:
  • Q:

    How did the Trojan War end?

    A:

    The Trojan War ended when the Greeks defeated Troy using a large wooden horse. The hollow wooden horse helped the Greeks gain entry inside the city walls of Troy.

    Full Answer >
    Filed Under:
  • Q:

    How long did the Trojan War last?

    A:

    The Trojan War lasted slightly more than 10 years. During the first nine years, the Greeks fought against the Trojans and its neighbors to attempt to cut off Troy's supplies and gain an advantage.

    Full Answer >
    Filed Under:
  • Q:

    What is a Trojan generic?

    A:

    A Trojan generic is a malicious program that provides a hacker unauthorized access to a user's computer terminal. Once a hacker gains access, the computer's security becomes compromised, which may lead to personal information theft or cause serious damage to the system.

    Full Answer >
    Filed Under:

Explore