Browse Definitions :
Definition

Venn diagram

A Venn diagram is an illustration of the relationships between and among sets, groups of objects that share something in common. Usually, Venn diagrams are used to depict set intersections (denoted by an upside-down letter U). This type of diagram is used in scientific and engineering presentations, in theoretical mathematics, in computer applications, and in statistics.

The drawing is an example of a Venn diagram that shows the relationship among three overlapping sets X, Y, and Z. The intersection relation is defined as the equivalent of the logic AND. An element is a member of the intersection of two sets if and only if that element is a member of both sets. Venn diagrams are generally drawn within a large rectangle that denotes the universe, the set of all elements under consideration.

/WhatIs/images/venn_diagram.gif (4259 bytes)

In this example, points that belong to none of the sets X, Y, or Z are gray. Points belonging only to set X are cyan in color; points belonging only to set Y are magenta; points belonging only to set Z are yellow. Points belonging to X and Y but not to Z are blue; points belonging to Y and Z but not to X are red; points belonging to X and Z but not to Y are green. Points contained in all three sets are black.

Here is a practical example of how a Venn diagram can illustrate a situation. Let the universe be the set of all computers in the world. Let X represent the set of all notebook computers in the world. Let Y represent the set of all computers in the world that are connected to the Internet. Let Z represent the set of all computers in the world that have anti-virus software installed. If you have a notebook computer and surf the Net, but you are not worried about viruses, your computer is probably represented by a point in the blue region. If you get concerned about computer viruses and install an anti-virus program, the point representing your computer will move into the black area.

This was last updated in April 2005

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

example
Cancel
oii handy dandy

Cancel
I dint get it at all can you help
Cancel
I stil don't understand its not helping me
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the ...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that ...

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • computational storage

    Computational storage is defined as an architecture that couples compute with storage in order to reduce data movement. In doing ...

  • data deduplication

    Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant ...

  • public cloud storage

    Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a ...

Close