Browse Definitions :
Definition

# inductive reasoning

Inductive reasoning is a logical process in which multiple premises, all believed true or found true most of the time, are combined to obtain a specific conclusion.

Inductive reasoning is often used in applications that involve prediction, forecasting, or behavior. Here is an example:

• Every tornado I have ever seen in the United States rotated counterclockwise, and I have seen dozens of them.
• We see a tornado in the distance, and we are in the United States.
• I conclude that the tornado we see right now must be rotating counterclockwise.

A meteorologist will tell you that in the United States (which lies in the northern hemisphere), most tornadoes rotate counterclockwise, but not all of them do. Therefore, the conclusion is probably true, but not necessarily true. Inductive reasoning is, unlike deductive reasoning, not logically rigorous. Imperfection can exist and inaccurate conclusions can occur, however rare; in deductive reasoning the conclusions are mathematically certain.

Inductive reasoning is sometimes confused with mathematical induction, an entirely different process. Mathematical induction is a form of deductive reasoning, in which logical certainties are "daisy chained" to derive a general conclusion about an infinite number of objects or situations.

This was last updated in October 2020

• ISO 31000 Risk Management

The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

• pure risk

Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

• risk reporting

Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

• Pretty Good Privacy (PGP)

Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

• email security

Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

• Blowfish

Blowfish is a variable-length, symmetric, 64-bit block cipher.

• What is risk mitigation?

Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

• fault-tolerant

Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

• synchronous replication

Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

• direct access

In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

• kibi, mebi, gibi, tebi, pebi and exbi

Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

• holographic storage (holostorage)

Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close