Browse Definitions :
Definition

combination and permutation

Contributor(s): Laura Fitzgibbons

In mathematics, combination and permutation are two different ways of grouping elements of a set into subsets. In a combination, the elements of the subset can be listed in any order. In a permutation, the elements of the subset are listed in a specific order. 

All data sets have a finite number of combinations as well as a finite number of permutations. This makes them useful for calculating probability for complex events. The more elements contained in a set, the greater the number of possible permutations and the smaller the probability that a specific permutation will occur. 

The common notations used for combination and permutation are as follows:

The number of combinations of n units consider r at a time is:

C(n,r)=          n!    

                 (n−r)!r!

The number of permutations of n units considered r at a time is:

P(n,r)=            n!    

                    (n−r)!

This was last updated in May 2018

Continue Reading About combination and permutation

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How does using combination or permutation make your project simpler?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close