Browse Definitions :
Definition

unary

The term unary defines operators in Boolean ( binary ) algebra, trinary algebra, arithmetic, and set theory . Sometimes a unary operation is called a monadic operation or a singulary operation.

In Boolean algebra , there is only one unary operation, known as negation. This operation changes the value of the bit (binary digit) from 0 to 1 or from 1 to 0.

In trinary algebra, which involves three-level logic with states that can be represented by the numbers -1, 0, and 1, there are five unary operators. They are called invert, rotate-up, rotate-down, shift-up, and shift-down. The actions performed by these operators are denoted in the following table.

Input Invert Rotate-up Rotate-down Shift-up Shift-down
-1 1 1 -1
1 -1 1 -1
1 -1 -1 1

In common arithmetic, the unary operators are negation, the reciprocal, and the absolute value. Negation involves reversing the sign of a number. For example, the negation of 4 is -4, and the negation of -23 is 23. The reciprocal involves dividing 1 by the number. Thus, the reciprocal of 4 is 1/4, and the reciprocal of -23 is -1/23. The absolute value involves reversing the sign of a number if it is negative, and leaving the number unchanged if it is 0 or positive. Thus, the absolute value of 4 is 4, and the absolute value of -23 is 23.

In set theory, there is one unary operator, called complementation. Given a set S that is a subset of some universal set U , the complement of S , written S' , is the set containing all elements of U that are not in S .

This was last updated in October 2007
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • What is cyber hygiene and why is it important?

    Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the ...

  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close