Browse Definitions :
Definition

vector

What is a vector?

A vector is a quantity or phenomenon that has two independent properties: magnitude and direction. The term also denotes the mathematical or geometrical representation of such a quantity.

Examples of vectors in nature are velocity, momentum, force, electromagnetic fields and weight. A quantity or phenomenon that exhibits magnitude only, with no specific direction, is called a scalar. Examples of scalars include speed, mass, electrical resistance and hard drive storage capacity.

What are vector attributes?

Vectors are typically represented by an arrow with a beginning, or tail, and an end, or head, that is usually represented by an arrowhead. Vectors delineate the movement from point A to point B and can be defined as an entity with a designation, such as vector a.

Graph showing a two-dimensional vector.
Figure 1. A vector shown on a two-dimensional Cartesian plane.

In mathematics, the Cartesian coordinate system depicts vectors using a number pair as shown in Figure 1. In this example, the vector is a directed line segment defined as (0,0), (7,7) using its numbered pairs. Vectors and scalars can be used in mathematical processes and vector operations, such as vector addition, vector subtraction and vector multiplication.

Vectors in computer graphics

Vectors can be depicted graphically in two or three dimensions. The magnitude of the vector is shown as the length of a line segment. The direction of the vector is shown by the orientation of the line segment and by an arrowhead at one end.

When creating images in vector graphics, the graphics file is a sequence of vector statements describing a series of points that connect to form the image. Examples of vector graphics software include Adobe Illustrator and CorelDraw.

Benefits of vector graphics

Vector graphics are used for many types of graphic images. This technology has gained popularity among graphic illustrators for the following reasons:

  • Flexibility and scalability. A designer can size an image in virtually any orientation and locate it anywhere on the screen.
  • Application and website development. Application and website developers like vector graphics because of scalability and the ability to create images on a variety of devices.
  • Animation. Vector graphics facilitates movement of images via animation.
  • Engineering design systems. Computer-aided design applications use vector graphics because of scalability and the ability to easily work with complex mathematical, scientific and engineering formulas.

Vector vs. raster graphics

raster graphics map individual bits -- each of which has its own qualities, such as color -- into an image via components called pixels, or picture elements. Raster images typically have a fixed number of pixels and are less scalable than vector images. As an image gets larger, individual pixels can become visible, resulting in the image being not as sharp or high quality as an equivalent vector image.

With raster images, computers must store each pixel, rather than a series of vector points. This often results in raster files being larger than vector graphics files. Adobe Illustrator and Adobe Photoshop are examples of software that is used to convert raster images into vector graphics files and vice versa.

Illustration comparing vector and raster images.
Figure 2. Vector and raster images often look different because vector graphics have a separate shape for each color shade, while raster images color each pixel in a way that shows color gradations and depth more clearly. At larger sizes, raster images pixelate; vector images do not.

Vectors in cybersecurity

In cybersecurity, the pathway that a threat actor or hacker uses to deliver their payload, such as a virus or ransomware, to a system or network is called an attack vector. This is how hackers exploit vulnerabilities in a system or network.

An attack vector can also be human, in the case of social engineering, where the perpetrator uses clever communication techniques to mislead users into giving out valuable information such as passwords. Typical attack vectors include malware, email attachments, instant messages and pop-up windows.

Cyber threat detection and mitigation systems include firewalls, intrusion detection systems, intrusion prevention systems and antivirus software. Numerous products and services are available to prevent threat actors from using attack vectors and to address threats.

Learn about the top ransomware attack vectors and how to avoid them.

This was last updated in December 2022

Continue Reading About vector

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close