Browse Definitions :


What is a vector?

A vector is a quantity or phenomenon that has two independent properties: magnitude and direction. The term also denotes the mathematical or geometrical representation of such a quantity.

Examples of vectors in nature are velocity, momentum, force, electromagnetic fields and weight. A quantity or phenomenon that exhibits magnitude only, with no specific direction, is called a scalar. Examples of scalars include speed, mass, electrical resistance and hard drive storage capacity.

What are vector attributes?

Vectors are typically represented by an arrow with a beginning, or tail, and an end, or head, that is usually represented by an arrowhead. Vectors delineate the movement from point A to point B and can be defined as an entity with a designation, such as vector a.

Graph showing a two-dimensional vector.
Figure 1. A vector shown on a two-dimensional Cartesian plane.

In mathematics, the Cartesian coordinate system depicts vectors using a number pair as shown in Figure 1. In this example, the vector is a directed line segment defined as (0,0), (7,7) using its numbered pairs. Vectors and scalars can be used in mathematical processes and vector operations, such as vector addition, vector subtraction and vector multiplication.

Vectors in computer graphics

Vectors can be depicted graphically in two or three dimensions. The magnitude of the vector is shown as the length of a line segment. The direction of the vector is shown by the orientation of the line segment and by an arrowhead at one end.

When creating images in vector graphics, the graphics file is a sequence of vector statements describing a series of points that connect to form the image. Examples of vector graphics software include Adobe Illustrator and CorelDraw.

Benefits of vector graphics

Vector graphics are used for many types of graphic images. This technology has gained popularity among graphic illustrators for the following reasons:

  • Flexibility and scalability. A designer can size an image in virtually any orientation and locate it anywhere on the screen.
  • Application and website development. Application and website developers like vector graphics because of scalability and the ability to create images on a variety of devices.
  • Animation. Vector graphics facilitates movement of images via animation.
  • Engineering design systems. Computer-aided design applications use vector graphics because of scalability and the ability to easily work with complex mathematical, scientific and engineering formulas.

Vector vs. raster graphics

Raster graphics map individual bits -- each of which has its own qualities, such as color -- into an image via components called pixels, or picture elements. Raster images typically have a fixed number of pixels and are less scalable than vector images. As an image gets larger, individual pixels can become visible, resulting in the image being not as sharp or high quality as an equivalent vector image.

With raster images, computers must store each pixel, rather than a series of vector points. This often results in raster files being larger than vector graphics files. Adobe Illustrator and Adobe Photoshop are examples of software that is used to convert raster images into vector graphics files and vice versa.

Illustration comparing vector and raster images.
Figure 2. Vector and raster images often look different because vector graphics have a separate shape for each color shade, while raster images color each pixel in a way that shows color gradations and depth more clearly. At larger sizes, raster images pixelate; vector images do not.

Vectors in cybersecurity

In cybersecurity, the pathway that a threat actor or hacker uses to deliver their payload, such as a virus or ransomware, to a system or network is called an attack vector. This is how hackers exploit vulnerabilities in a system or network.

An attack vector can also be human, in the case of social engineering, where the perpetrator uses clever communication techniques to mislead users into giving out valuable information such as passwords. Typical attack vectors include malware, email attachments, instant messages and pop-up windows.

Cyber threat detection and mitigation systems include firewalls, intrusion detection systems, intrusion prevention systems and antivirus software. Numerous products and services are available to prevent threat actors from using attack vectors and to address threats.

Learn about the top ransomware attack vectors and how to avoid them.

This was last updated in December 2022

Continue Reading About vector

  • packet filtering

    Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and ...

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local ...

  • network protocol

    A network protocol is a set of established rules that specify how to format, send and receive data so that computer network ...

  • FIDO (Fast Identity Online)

    FIDO (Fast Identity Online) is a set of technology-agnostic security specifications for strong authentication.

  • Cloud Security Alliance (CSA)

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classical computers by ...

  • transaction

    In computing, a transaction is a set of related tasks treated as a single action.

  • lean management

    Lean management is an approach to managing an organization that supports the concept of continuous improvement, a long-term ...

  • device ID (device identification)

    A device ID (device identification) is an anonymous string of numbers and letters that uniquely identifies a mobile device such ...

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • passive candidate

    A passive candidate (passive job candidate) is anyone in the workforce who is not actively looking for a job.

Customer Experience
  • product-qualified lead (PQL)

    A product-qualified lead (PQL) is an individual or business that experienced value from using a product as a result of a free ...

  • marketing-qualified lead (MQL)

    A marketing-qualified lead (MQL) is a website visitor whose engagement levels indicate they are likely to become a customer.

  • customer success

    Customer success is a strategy to ensure a company's products are meeting the needs of the customer.