Browse Definitions:
Definition

# limit

In mathematics, a limit is a value toward which an expression converges as one or more variables approach certain values. Limits are important in calculus and analysis.

Consider the limit of the expression 2 x + 3 as x approaches 0. It is not difficult to see that this limit is 3, because we can assign the value 0 to the variable x and perform the calculation directly. This sort of substitution is not possible, however, when we consider the limit of the expression 1/ x - 2 as x increases without limit. (The expression for this is ' x approaches infinity.') It is apparent that 1/ x approaches 0 as 1/ x approaches infinity, although we cannot directly substitute infinity for x and calculate 1/ x = 0. The limit, as x approaches infinity, of 1/ x - 2 is therefore equal to -2.

These expressions would be denoted in mathematical literature as follows:

The term 'limit' is symbolized 'Lim.' The arrow means 'approaches.' Infinity is symbolized by the sideways 8.

Also see infinity and Mathematical Symbols .

This was last updated in September 2005

#### Start the conversation

Send me notifications when other members comment.

## SearchCompliance

• ### PCAOB (Public Company Accounting Oversight Board)

The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

• ### cyborg anthropologist

A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

• ### RegTech

RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

## SearchSecurity

A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a ...

• ### email spam

Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

• ### distributed denial of service (DDoS) attack

A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

## SearchHealthIT

• ### revenue cycle management (RCM)

Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to ...

• ### national provider identifier (NPI)

A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare ...

• ### PHI breach (protected health information breach)

A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or ...

## SearchDisasterRecovery

• ### disaster recovery as a service (DRaaS)

One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

• ### data recovery

Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

• ### disaster recovery plan (DRP)

A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

## SearchStorage

• ### GlusterFS (Gluster File System)

GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

• ### virtual memory

Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

• ### yottabyte (YB)

A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

## SearchSolidStateStorage

• ### PCIe SSD (PCIe solid-state drive)

A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

• ### SSD caching

SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

• ### NVDIMM (Non-Volatile Dual In-line Memory Module)

An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

## SearchCloudStorage

• ### RESTful API

A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

• ### cloud storage infrastructure

Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

• ### Zadara VPSA and ZIOS

Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close