当前位置:网站首页>The most popular colloquial system explains the base of numbers
The most popular colloquial system explains the base of numbers
2022-07-06 14:09:00 【Big talk code farmer】
A lot of friends , I don't know much about base , Today, let's talk about base , To understand hexadecimal, let's first think about a scenario , In ancient times , At the beginning, human beings had no concept of numbers , Every time I finish hunting , Just pile them together . Maybe one day, an ape man used his finger to represent a prey , After that, every time I came back from hunting, I would use my fingers to represent a prey , With more and more prey , He used up all his fingers and found that they could only represent ten prey , No amount of prey can be counted , This is after his hard thinking , Finally came up with this idea : That is, when ten fingers are used up , Just use a stick to replace the ten fingers of the hand just counted , This is the great invention of Radix , It's just that he didn't expect it to be a base , This is the decimal system , Later, ten wooden sticks were used , Using the same idea, use a larger stick to represent the just counted ten sticks , This has become a familiar , ten , Hundred bit .
But from the perspective of base, it is low , High position , High again .
This is to recall that our parents told us to count when we were young ,1 2 3 4 5 6 7 8 9 10
When I was a child, I always had a question why I had to count until 10, Looking back, it seems that our ancestors grew ten fingers :).
If it grows 8 A finger , Then we may count to 8 It stops .
边栏推荐
- Relationship between hashcode() and equals()
- Implementation of count (*) in MySQL
- Implementation principle of automatic capacity expansion mechanism of ArrayList
- 【Numpy和Pytorch的数据处理】
- Network layer - simple ARP disconnection
- 3. Input and output functions (printf, scanf, getchar and putchar)
- 撲克牌遊戲程序——人機對抗
- Tencent map circle
- xray與burp聯動 挖掘
- Experiment 6 inheritance and polymorphism
猜你喜欢
Ucos-iii learning records (11) - task management
Intranet information collection of Intranet penetration (5)
Web vulnerability - File Inclusion Vulnerability of file operation
Strengthen basic learning records
Meituan dynamic thread pool practice ideas, open source
Mixlab unbounded community white paper officially released
Relationship between hashcode() and equals()
7-5 staircase upgrade (PTA program design)
HackMyvm靶机系列(2)-warrior
Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
随机推荐
HackMyvm靶机系列(7)-Tron
7-4 散列表查找(PTA程序设计)
[MySQL database learning]
Xray and burp linkage mining
Record an API interface SQL injection practice
The difference between cookies and sessions
Hackmyvm Target Series (3) - vues
Beautified table style
Hackmyvm target series (3) -visions
Hackmyvm target series (2) -warrior
Build domain environment (win)
A complete collection of papers on text recognition
Nuxtjs quick start (nuxt2)
Brief introduction to XHR - basic use of XHR
7-6 矩阵的局部极小值(PTA程序设计)
7-14 error ticket (PTA program design)
. How to upload XMIND files to Jinshan document sharing online editing?
QT meta object qmetaobject indexofslot and other functions to obtain class methods attention
强化学习基础记录
【VMware异常问题】问题分析&解决办法