Browse Definitions:
Definition

# unary

The term unary defines operators in Boolean ( binary ) algebra, trinary algebra, arithmetic, and set theory . Sometimes a unary operation is called a monadic operation or a singulary operation.

In Boolean algebra , there is only one unary operation, known as negation. This operation changes the value of the bit (binary digit) from 0 to 1 or from 1 to 0.

In trinary algebra, which involves three-level logic with states that can be represented by the numbers -1, 0, and 1, there are five unary operators. They are called invert, rotate-up, rotate-down, shift-up, and shift-down. The actions performed by these operators are denoted in the following table.

 Input Invert Rotate-up Rotate-down Shift-up Shift-down -1 1 1 -1 1 -1 1 -1 1 -1 -1 1

In common arithmetic, the unary operators are negation, the reciprocal, and the absolute value. Negation involves reversing the sign of a number. For example, the negation of 4 is -4, and the negation of -23 is 23. The reciprocal involves dividing 1 by the number. Thus, the reciprocal of 4 is 1/4, and the reciprocal of -23 is -1/23. The absolute value involves reversing the sign of a number if it is negative, and leaving the number unchanged if it is 0 or positive. Thus, the absolute value of 4 is 4, and the absolute value of -23 is 23.

In set theory, there is one unary operator, called complementation. Given a set S that is a subset of some universal set U , the complement of S , written S' , is the set containing all elements of U that are not in S .

This was last updated in October 2007

### 1 comment

Send me notifications when other members comment.
Thanks--a very clear explanation. i had forgotten the terminology.
Cancel

## SearchCompliance

• ### internal audit (IA)

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

• ### pure risk (absolute risk)

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

• ### risk assessment

Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

## SearchSecurity

• ### security information and event management (SIEM)

Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of ...

• ### polymorphic virus

A polymorphic virus is a harmful, destructive or intrusive type of malware that can change or 'morph,' making it difficult to ...

• ### cyberterrorism

According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

## SearchHealthIT

• ### accountable care organization (ACO)

An accountable care organization (ACO) is an association of hospitals, healthcare providers and insurers in which all parties ...

• ### patient engagement

Patient engagement is an ideal healthcare situation in which people are well-informed about -- and motivated to be involved -- in...

• ### personal health record (PHR)

A personal health record (PHR) is a collection of health-related information that is documented and maintained by the individual ...

## SearchDisasterRecovery

• ### business continuity and disaster recovery (BCDR)

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

• ### business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

• ### call tree

A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

## SearchStorage

• ### NVMe over Fibre Channel (NVMe over FC) or FC-NVMe standard

Nonvolatile memory express over Fibre Channel (NVMe over FC) -- which is implemented through the Fibre Channel-NVMe (FC-NVMe) ...

• ### NVMe over Fabrics (NVMe-oF)

NVMe over Fabrics (NVMe-oF) is a technology specification designed to enable nonvolatile memory express message-based commands to...

• ### cloud object storage

Cloud object storage is a format for storing unstructured data in the cloud.

## SearchSolidStateStorage

• ### hybrid hard disk drive (HDD)

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close