Browse Definitions:
Definition

# unary

The term unary defines operators in Boolean ( binary ) algebra, trinary algebra, arithmetic, and set theory . Sometimes a unary operation is called a monadic operation or a singulary operation.

In Boolean algebra , there is only one unary operation, known as negation. This operation changes the value of the bit (binary digit) from 0 to 1 or from 1 to 0.

In trinary algebra, which involves three-level logic with states that can be represented by the numbers -1, 0, and 1, there are five unary operators. They are called invert, rotate-up, rotate-down, shift-up, and shift-down. The actions performed by these operators are denoted in the following table.

 Input Invert Rotate-up Rotate-down Shift-up Shift-down -1 1 1 -1 1 -1 1 -1 1 -1 -1 1

In common arithmetic, the unary operators are negation, the reciprocal, and the absolute value. Negation involves reversing the sign of a number. For example, the negation of 4 is -4, and the negation of -23 is 23. The reciprocal involves dividing 1 by the number. Thus, the reciprocal of 4 is 1/4, and the reciprocal of -23 is -1/23. The absolute value involves reversing the sign of a number if it is negative, and leaving the number unchanged if it is 0 or positive. Thus, the absolute value of 4 is 4, and the absolute value of -23 is 23.

In set theory, there is one unary operator, called complementation. Given a set S that is a subset of some universal set U , the complement of S , written S' , is the set containing all elements of U that are not in S .

This was last updated in October 2007

### 1 comment

Send me notifications when other members comment.
Thanks--a very clear explanation. i had forgotten the terminology.
Cancel

## SearchCompliance

• ### PCAOB (Public Company Accounting Oversight Board)

The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

• ### cyborg anthropologist

A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

• ### RegTech

RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

## SearchSecurity

• ### email spam

Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

• ### distributed denial of service (DDoS) attack

A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

• ### application whitelisting

Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

## SearchHealthIT

• ### athenahealth Inc.

Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

• ### Affordable Care Act (ACA or Obamacare)

The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

• ### HIPAA Privacy Rule

The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

## SearchDisasterRecovery

• ### disaster recovery as a service (DRaaS)

One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

• ### data recovery

Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

• ### disaster recovery plan (DRP)

A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

## SearchStorage

• ### virtual memory

Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

• ### yottabyte (YB)

A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

• ### Kilo, mega, giga, tera, peta, exa, zetta and all that

Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

## SearchSolidStateStorage

• ### PCIe SSD (PCIe solid-state drive)

A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

• ### SSD caching

SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

• ### NVDIMM (Non-Volatile Dual In-line Memory Module)

An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

## SearchCloudStorage

• ### RESTful API

A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

• ### cloud storage infrastructure

Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

• ### Zadara VPSA and ZIOS

Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close