Browse Definitions :
Definition

natural number

A natural number is a number that occurs commonly and obviously in nature. As such, it is a whole, non-negative number. The set of natural numbers, denoted N, can be defined in either of two ways:

N = {0, 1, 2, 3, ...}

N = (1, 2, 3, 4, ...}

In mathematical equations, unknown or unspecified natural numbers are represented by lowercase, italicized letters from the middle of the alphabet. The most common is n, followed by m, p, and q. In subscripts, the lowercase i is sometimes used to represent a non-specific natural number when denoting the elements in a sequence or series. However, i is more often used to represent the positive square root of -1, the unit imaginary number.

The set N, whether or not it includes zero, is a denumerable set. Denumerability refers to the fact that, even though there might be an infinite number of elements in a set, those elements can be denoted by a list that implies the identity of every element in the set. For example, it is intuitive from either the list {1, 2, 3, 4, ...} or the list {0, 1, 2, 3, ...} that 356,804,251 is a natural number, but 356,804,251.5, 2/3, and -23 are not.

Both of the sets of natural numbers defined above are denumerable. They are also exactly the same size. It's not difficult to prove this; their elements can be paired off one-to-one, with no elements being left out of either set. In infinite sets, the existence of a one-to-one correspondence is the litmus test for determining cardinality, or size. The set of integers and the set of rational numbers has the same cardinality as N. However, the sets of real numbers, imaginary numbers, and complex numbers have cardinality larger than that of N.

See also: integer, rational number, real number, imaginary number, complex number

This was last updated in March 2019

Continue Reading About natural number

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close