Definition

# set

SET is also an acronym for Secure Electronic Transaction.

A set is a group or collection of objects or numbers, considered as an entity unto itself. Sets are usually symbolized by uppercase, italicized, boldface letters such as A, B, S, or Z. Each object or number in a set is called a member or element of the set. Examples include the set of all computers in the world, the set of all apples on a tree, and the set of all irrational numbers between 0 and 1.

When the elements of a set can be listed or denumerated, it is customary to enclose the list in curly brackets. Thus, for example, we might speak of the set (call it K) of all natural numbers between, and including, 5 and 10 as:

K = {5, 6, 7, 8, 9, 10}

A set can have any non-negative quantity of elements, ranging from none (the empty set or null set) to infinitely many. The number of elements in a set is called the cardinality, and can range from zero to denumerably infinite (for the sets of natural numbers, integers, or rational numbers) to non-denumerably infinite for the sets of irrational numbers, real numbers, imaginary numbers, or complex numbers).

The most basic relations in set theory can be summarized as follows.

• A set S1 is a subset of set S if and only if every element of S1 is also an element of S.
• A set S1 is a proper subset of set S if and only if every element of S1 is also an element of S, but there are some elements in S that are not elements of S1.
• The intersection of two sets S and T is the set X of all elements x such that x is in S and x is in T.
• The union of two sets S and T is the set Y of all elements y such that y is in S or y is in T, or both.

Relationships between and among sets can be illustrated by means of a special type of drawing called a Venn diagram. The table below denotes common set symbology.

Set theory is fundamental to all of mathematics. In its "pure" form, set theory can be esoteric and even bizarre, and is primarily of interest to academics. However, set theory is closely connected with symbolic logic, and these fields are becoming increasingly relevant in software engineering, especially in the fields of artificial intelligence and communications security.

This was last updated in September 2005

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchCloudSecurity

• ### Cloudflare Access takes on VPNs with reverse proxy approach

Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace ...

• ### TLS 1.3: What it means for enterprise cloud use

The latest draft version of TLS 1.3 is out, and it will likely affect enterprises that use cloud services. Expert Ed Moyle ...

• ### The biggest cloud security threats, according to the CSA

The Cloud Security Alliance reported what it found to be the biggest cloud security threats. Expert Rob Shapland looks at how ...

## SearchNetworking

• ### ThousandEyes-Juniper pact focuses on hybrid WANs

ThousandEyes and Juniper boost visibility for hybrid WANs; IDC records sharp rise in cloud spending; and a vendor group issues ...

• ### ExtremeLocation latest addition to Extreme wireless portfolio

Extreme Networks is targeting retailers with a new set of services, called ExtremeLocation. The latest technology adds ...

• ### Take network configuration management tools to the next level

Script management systems and intent-based networking are driving the future of network configuration management tools, shifting ...

## SearchCIO

• ### Some may not know it, but companies want CIOs with cloud expertise

Organizations know what benefits cloud computing can bring -- and they're seeking out IT leaders with cloud expertise to make ...

• ### 'Patient journey' propels hospital's digital transformation

The chief innovation officer at Boston Children's Hospital explains how digital technologies are changing the 'patient journey' ...

• ### Wayfair's chief architect talks AI-driven innovation, impactful IT

Wayfair sells home furnishings, but under the covers, it's a tech juggernaut. Chief Architect Ben Clark explains how AI-driven ...

## SearchEnterpriseDesktop

• ### Ten Windows 10 Fall Creators Update features to know

Microsoft introduced some significant changes to Windows 10 in the Fall Creators Update. The My People app, for example, lets ...

• ### Guard the line with Windows Defender features

The Windows 10 Fall Creators Update took Windows 10 security up a notch by adding advanced features to Windows Defender, ...

• ### Ready to master virtualization-based security in Windows 10?

Put your knowledge of virtualization-based security in Windows 10 on the line with this quiz covering the ins and outs of ...

## SearchCloudComputing

• ### Gauge your knowledge of cloud providers' AI technologies

As enterprise interest grows, major cloud providers continue to unveil machine learning and AI services. See how much you know ...

• ### Google Cloud Dedicated Interconnect offers VPN alternative

Google's Dedicated Interconnect enables an enterprise to privately connect its data center to the public cloud. Here's a ...

• ### Meltdown-Spectre bugs hit cloud usage less than first feared

IT shops expected their cloud usage to flag due to recent chip bugs, but most environments survived the patches unscathed.

## ComputerWeekly.com

• ### Do website design platforms pose too big a security risk?

Cloud-based website design platforms are booming in popularity because of their simplicity and affordability, but business ...

• ### Intel recalls botched Spectre fix

The inventor of Linux, Linus Torvalds, vents his frustration and suggests Intel has no plans to fix Spectre flaw

• ### Mastercard sets biometric ID deadline for banks

Mastercard has committed to guaranteeing that every one of its customers will have access to biometric authentication services by...

Close