Browse Definitions :
Definition

deductive reasoning

Contributor(s): Stan Gibilisco

Deductive reasoning is a logical process in which a conclusion is based on the concordance of multiple premises that are generally assumed to be true. 

Deductive reasoning is sometimes referred to as top-down logic. Its counterpart, inductive reasoning, is sometimes referred to as bottom-up logic. Where deductive reasoning proceeds from general premises to a specific conclusion, inductive reasoning proceeds from specific premises to a general conclusion. 

The Greek philosopher Aristotle, who is considered the father of deductive reasoning, wrote the following classic example:

  • All men are mortal.
  • Socrates is a man.
  • Therefore, Socrates is mortal.

In Aristotle’s example, sometimes referred to as a syllogism, the premises of the argument -- that all men are mortal and that Socrates is a man -- are self-evidently true. Because the premises establish that Socrates is an individual in a group whose members are all mortal, the inescapable conclusion is that Socrates must likewise be mortal.

 

This was last updated in May 2013

Continue Reading About deductive reasoning

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

CRACK COCAINE
Cancel
hi
Cancel
Excellent brief explanation. Thank you!
Cancel
very good explanation ..... this site is very helpful....ThankYou   
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close