Browse Definitions :
Definition

rounding error

Contributor(s): Stan Gibilisco

Rounding error is the difference between a rounded-off numerical value and the actual value. A rounded quantity is represented by a numeral with a fixed number of allowed digits, with the last digit set to the value that produces the smallest difference between the rounded quantity and the actual quantity.

Rounding can produce a value that is easier to deal with than the actual value, especially if the actual value contains a lot of digits. Rounding can also be done to indicate the relative precision of a value. For example, the irrational number pi equals approximately 3.14, rounded to two decimal places or three significant digits.

As an example of rounding error, consider the speed of light in a vacuum. The official value is 299,792,458 meters per second. In scientific (power-of-10) notation, that quantity is expressed as 2.99792458 x 108. Rounding it to three decimal places yields 2.998 x 108. The rounding error is the difference between the actual value and the rounded value, in this case (2.998 - 2.99792458) x 108, which works out to 0.00007542 x 108. Expressed in the correct scientific notation format, that value is 7.542 x 103, which equals 7542 in plain decimal notation.

This was last updated in June 2012

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close