Browse Definitions :
Definition

centimeter (cm)

The centimeter (abbreviation, cm) is a unit of displacement (distance or length) in the cgs (centimeter/gram/second) system of units. The cm is equivalent to 0.01 meter, and there are about 2.54 centimeters in one linear inch.

In the metric system, power-of-10 prefix multipliers facilitate the derivation of other, often more convenient, distance units from the centimeter. One meter (m) is equal to 100 cm, one millimeter (mm) is equal to 0.1 cm, and one kilometer (km) is equal to 100,000 (105) cm. These units are found in nonscientific as well as scientific literature. Smaller units are the realm of the scientist and engineer. One micrometer (symbolized µm or µ), also called a micron, is equal to 0.0001 (10-4) cm. One nanometer (nm) is equal to 10-7 cm. One Angström unit (symbolized Ä) is equal to 10-8 cm, or 0.1 nm.

One centimeter is the distance traveled by a ray of electromagnetic (EM) energy through a vacuum in 3.33564095 x 10-11 of a second. The centimeter and its kin are used to specify the wavelengths of EM fields, particularly at ultra-high and microwave radio frequencies. The so-called radio spectrum occupies an informally defined range of wavelengths from roughly 1 mm to several tens of kilometers. A 300-cm radio wave falls near the middle of the standard FM (frequency-modulation) broadcast band; a 1-cm radio wave corresponds to a frequency of approximately 30 gigahertz (GHz). The range of visible light wavelengths is from approximately 390 nm (violet) to 770 nm (red). The speed of EM-field propagation in a vacuum, to nine significant figures, is 2.99792458 x 1010 centimeters per second.

Also see displacement, meter, prefix multipliers, and International System of Units (SI).

This was last updated in January 2017

Continue Reading About centimeter (cm)

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

HY
Cancel
how can i get help here please house

Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close