1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
13

What was the treaty of the Meter

Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
7 0

The CGPM is an intergovernmental treaty organization created by a diplomatic treaty called the Meter Convention (Convention du  Mètre, often called the Treaty of the Meter in the United States). The Meter Convention was signed in Paris in 1875 by representatives of seventeen nations, including the United States.

You might be interested in
A _______ attack is where the input includes code that is then executed by the attacked system.
sweet [91]

Answer: Code injection

Explanation:

3 0
2 years ago
What is another name for repetition in programming?
BigorU [14]
The answer is Iteration
3 0
3 years ago
GUYS PLEASEEEE HELP !!!
Rina8888 [55]

Answer:

try to contact them by email

Explanation:

thats my best guess

4 0
4 years ago
Read 2 more answers
How to transfer word 2019 from one computer to another
Misha Larkins [42]

Answer:

The easiest way would be to download it on the other computer.

I'm guessing you want all of your word documents. To achieve this, simply log into your account on the other device.

4 0
2 years ago
When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
GREYUIT [131]

Answer:

c. 4 to 6

Explanation:

According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.

Hence, in this case, the correct answer is option C

4 0
3 years ago
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • What function does a security certificate perform
    15·2 answers
  • How many pairs of chromosomes do human body cells contain?
    7·2 answers
  • the part of the computer that provides access to the internet is the A.modem B. keyboard C. monitor or D.system unit
    7·2 answers
  • Why are audio files compressed?
    12·1 answer
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • By recording where a hockey puck goes into a net, a goalie can...
    8·2 answers
  • 6. When working with a file,
    9·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!