Browse Definitions :
Definition

transcendental number

A transcendental number is a real number that is not the solution of any single-variable polynomial equation whose coefficients are all integers . All transcendental numbers are irrational numbers . But the converse is not true; there are some irrational numbers that are not transcendental.

Examples of transcendental numbers include pi , the ratio of a circle's circumference to its diameter in a plane, and e , the base of the natural logarithm . The case of pi has historical significance. The fact that pi is transcendental means that it is impossible to draw to perfection, using a compass and straightedge and following the ancient Greek rules for geometric constructions, a square with the same area as a given circle. This ancient puzzle, known as squaring the circle , was, for centuries, one of the most baffling challenges in geometry. Schemes have been devised that provide amazingly close approximations to squaring the circle. But in theoretical mathematics (unlike physics and engineering), approximations are never good enough; a solution, scheme, or method is either valid, or else it is not.

It can be difficult, and perhaps impossible, to determine whether or not a certain irrational number is transcendental. Some numbers defy classification (algebraic, irrational, or transcendental) to this day. Two examples are the product of pi and e (call this quantity P pie ) and the sum of pi and e (call this S pie ). It has been proved that pi and e are both transcendental. It has also been shown that at least one of the two quantities P pie and S pie are transcendental. But as of this writing, no one has rigorously proven that P pie is transcendental, and no one has rigorously proved that S pie is transcendental.

This was last updated in September 2005
SearchNetworking
  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close