Browse Definitions :
Definition

natural number

A natural number is a number that occurs commonly and obviously in nature. As such, it is a whole, non-negative number. The set of natural numbers, denoted N, can be defined in either of two ways:

N = {0, 1, 2, 3, ...}

N = (1, 2, 3, 4, ...}

In mathematical equations, unknown or unspecified natural numbers are represented by lowercase, italicized letters from the middle of the alphabet. The most common is n, followed by m, p, and q. In subscripts, the lowercase i is sometimes used to represent a non-specific natural number when denoting the elements in a sequence or series. However, i is more often used to represent the positive square root of -1, the unit imaginary number.

The set N, whether or not it includes zero, is a denumerable set. Denumerability refers to the fact that, even though there might be an infinite number of elements in a set, those elements can be denoted by a list that implies the identity of every element in the set. For example, it is intuitive from either the list {1, 2, 3, 4, ...} or the list {0, 1, 2, 3, ...} that 356,804,251 is a natural number, but 356,804,251.5, 2/3, and -23 are not.

Both of the sets of natural numbers defined above are denumerable. They are also exactly the same size. It's not difficult to prove this; their elements can be paired off one-to-one, with no elements being left out of either set. In infinite sets, the existence of a one-to-one correspondence is the litmus test for determining cardinality, or size. The set of integers and the set of rational numbers has the same cardinality as N. However, the sets of real numbers, imaginary numbers, and complex numbers have cardinality larger than that of N.

See also: integer, rational number, real number, imaginary number, complex number

This was last updated in March 2019

Continue Reading About natural number

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close