Browse Definitions :
Definition

# Venn diagram

A Venn diagram is an illustration of the relationships between and among sets, groups of objects that share something in common. Usually, Venn diagrams are used to depict set intersections (denoted by an upside-down letter U). This type of diagram is used in scientific and engineering presentations, in theoretical mathematics, in computer applications, and in statistics.

The drawing is an example of a Venn diagram that shows the relationship among three overlapping sets X, Y, and Z. The intersection relation is defined as the equivalent of the logic AND. An element is a member of the intersection of two sets if and only if that element is a member of both sets. Venn diagrams are generally drawn within a large rectangle that denotes the universe, the set of all elements under consideration.

In this example, points that belong to none of the sets X, Y, or Z are gray. Points belonging only to set X are cyan in color; points belonging only to set Y are magenta; points belonging only to set Z are yellow. Points belonging to X and Y but not to Z are blue; points belonging to Y and Z but not to X are red; points belonging to X and Z but not to Y are green. Points contained in all three sets are black.

Here is a practical example of how a Venn diagram can illustrate a situation. Let the universe be the set of all computers in the world. Let X represent the set of all notebook computers in the world. Let Y represent the set of all computers in the world that are connected to the Internet. Let Z represent the set of all computers in the world that have anti-virus software installed. If you have a notebook computer and surf the Net, but you are not worried about viruses, your computer is probably represented by a point in the blue region. If you get concerned about computer viruses and install an anti-virus program, the point representing your computer will move into the black area.

This was last updated in April 2005
• man in the browser (MitB)

Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

• Patch Tuesday

Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

• parameter tampering

Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

• chief procurement officer (CPO)

The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

• Lean Six Sigma

Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

• change management

Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

• clickstream data (clickstream analytics)

Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

• neuromarketing

Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

• contextual marketing

Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close