Browse Definitions :
Definition

# natural number

A natural number is a number that occurs commonly and obviously in nature. As such, it is a whole, non-negative number. The set of natural numbers, denoted N, can be defined in either of two ways:

N = {0, 1, 2, 3, ...}

N = (1, 2, 3, 4, ...}

In mathematical equations, unknown or unspecified natural numbers are represented by lowercase, italicized letters from the middle of the alphabet. The most common is n, followed by m, p, and q. In subscripts, the lowercase i is sometimes used to represent a non-specific natural number when denoting the elements in a sequence or series. However, i is more often used to represent the positive square root of -1, the unit imaginary number.

The set N, whether or not it includes zero, is a denumerable set. Denumerability refers to the fact that, even though there might be an infinite number of elements in a set, those elements can be denoted by a list that implies the identity of every element in the set. For example, it is intuitive from either the list {1, 2, 3, 4, ...} or the list {0, 1, 2, 3, ...} that 356,804,251 is a natural number, but 356,804,251.5, 2/3, and -23 are not.

Both of the sets of natural numbers defined above are denumerable. They are also exactly the same size. It's not difficult to prove this; their elements can be paired off one-to-one, with no elements being left out of either set. In infinite sets, the existence of a one-to-one correspondence is the litmus test for determining cardinality, or size. The set of integers and the set of rational numbers has the same cardinality as N. However, the sets of real numbers, imaginary numbers, and complex numbers have cardinality larger than that of N.

This was last updated in March 2019

• quantum key distribution (QKD)

Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

• Common Body of Knowledge (CBK)

In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

• buffer underflow

A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

• benchmark

A benchmark is a standard or point of reference people can use to measure something else.

• spatial computing

Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

• organizational goals

Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

• talent acquisition

Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

• employee retention

Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

• hybrid work model

A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

• database marketing

Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

• cost per engagement (CPE)

Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...