3|2086, 8 is in the tenth place, which means 810; 9 | 3787,7 takes hundreds as the unit, which means 700; 10|7398, 1 expressed as 1 100,000; 69|0520, 9 in 10,000, indicating 90,000; 0 is in thousands, which means 0 thousand.
I. Introduction to Arabic numerals
Arabic numerals consist of 0, 1, 2, 3, 4, 5, 6, 7, 8, 9*** 10 counting symbols. Take the position value method, the high position is on the left, the low position is on the right, and the writing is from left to right. With the help of some simple mathematical symbols (decimal point, minus sign, percent sign, etc. ), this system can clearly represent all rational numbers. In order to express extremely large or extremely small numbers, people have created scientific notation on the basis of Arabic numerals.
Second, the origin of Arabic numerals
Around 500 A.D., with the rise and development of economy and caste system, Punjab in the northwest of Indian subcontinent has been in a leading position in mathematics. Astronomer Ayepihite has made a new breakthrough in simplifying numbers. He wrote the numbers in the grid. If there is a symbol in the first grid, such as a point representing 1, then the same point in the second grid represents ten, and the point in the third grid represents one hundred.
In this way, not only the digital symbols themselves, but also their position order is of great significance. Later, Indian scholars introduced the symbol zero. It can be said that these symbols and representations are the old ancestors of Arabic numerals today.
Third, the application of numbers in science and technology.
The application of mathematics in science and technology includes cryptography, computer graphics, control theory, numerical calculation, signal processing and so on. Cryptography is an algorithm and technology used to protect data security. Its design and implementation are very dependent on mathematical theories and methods, such as discrete logarithm problem, elliptic curve encryption, prime number decomposition and so on. These advanced mathematical theories are widely used in the current information security technology field.