Browse Definitions :
Definition

digit

A digit is an element of a set that, taken as a whole, comprises a system of numeration. Thus, a digit is a number in a specific context. In the decimal (base-10) Arabic numbering system, the digits are the elements of the set {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}.

In the binary number system, the digits are the elements of the set {0, 1}. This system is used by computers because the two digits can represent the logic low and high states. The term "binary digit" is compressed to " bit " in computer parlance. Other numbering systems used in computing include the octal and hexadecimal systems. In the octal number system, the digits are the elements of the set {0, 1, 2, 3, 4, 5, 6, 7}. In the hexadecimal system, the digits are the elements of the set {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F}.

The term "digit" is often used to represent a number in a specific position in a larger number, or in a number with a fraction expressed using a radix point. For example, in the decimal number 2609.37, the number 2 is the thousands digit, the number 6 is the hundreds digit, the number 0 is the tens digit, the number 9 is the ones digit, the number 3 is the tenths digit, and the number 7 is the hundredths digit.

In biology and anatomy, the term refers to a finger or toe of a human or animal. In robotics, the term can refer to any small, useful appendage in an end effector (robot hand).

This was last updated in September 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close