wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Components of GIS

profile
Lucky Gupta
Mar 14, 2023
1 Like
0 Discussions
83 Reads

 

The 3 main components of Geographic Information Systems are:

 

1. Data

GIS stores location data as thematic layers. Each data set has an attribute table that stores information about the feature. The two main types of GIS data are raster and vector:

 

Raster Pixels

Raster

Raster data look like grids because they store data in rows and columns. They can be discrete or continuous. For example, we often represent land cover, temperature data, and imagery as raster data.

 

Editing Trace

Vector

Vectors are points, lines, and polygons with vertices. For example, fire hydrants, contours, and administrative boundaries are often vectors.


Comments ()


Sign in

Read Next

Firewall

Blog banner

"Mahakali cave"

Blog banner

Harsh Rathod

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

What is Minting & Mining

Blog banner

M commerce

Blog banner

Dangers of Using Public WiFis

Blog banner

How to use GIT & GITHUB

Blog banner

What is semaphore in operating system?

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Visualization in Data Science

Blog banner

OS ASSIGNMENT

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

In the world of Technology...

Blog banner

Service Operations Principles

Blog banner

Mental Health

Blog banner

Virtual memory

Blog banner

Yahoo! mail

Blog banner

How to tie a Tie

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Fashion marketing in india

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Virtual memory in os

Blog banner

Compromising Mobile Platforms

Blog banner

Junk food vs healthy food

Blog banner

LINUX

Blog banner

EMAIL INVESTIGATION

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Models of Information Security.

Blog banner

semaphores in os

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Earth with no trees

Blog banner

Memory input output management

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Real Time Scheduling

Blog banner

Excel records

Blog banner

Assignment-3

Blog banner