wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

GIS Topography

profile
Rishika Vishwakarma
Mar 17, 2023
0 Likes
0 Discussions
170 Reads

Topography is the study of the land surface. In particular, it lays the underlying foundation of a landscape. For example, topography refers to mountains, valleys, rivers, or craters on the surface. Elevation is the distinguishing factor for topographic maps.

In GIS, we use digital elevation models for the terrain. Nine out of ten topographic maps show contour lines, which are just lines of equal elevation. The narrow definition of topography is specific to the arrangement of landforms.

But in a broader sense, it incorporates natural and artificial features. For example, topographic maps often tie in administrative boundaries, cities, hydrography, parks, landmarks, transportation, and buildings.

For the purposes of this article, topography specifically involves the recording of relief or terrain, the three-dimensional quality of the surface, and the identification of specific landforms. This is also known as geomorphometry. In modern usage, this involves generation of elevation data in electronic form. It is often considered to include the graphic representation of the landform on a map by a variety of techniques, including contour lines, Hypsometric tints, and relief shading


Comments ()


Sign in

Read Next

Landslide Hazard

Blog banner

Google classroom

Blog banner

Security Breaches in Stock market trading

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Concept and definition of m-commerce

Blog banner

Kafka - A Framework

Blog banner

DISK SCHEDULING

Blog banner

Fashion design

Blog banner

A small world of Sockets

Blog banner

Evolution of the Microprocesor

Blog banner

Risk factors in service transistion

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

MOVEMBER

Blog banner

Dos (Denial of service) Attack

Blog banner

Memory Management

Blog banner

Outlook.com

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

What is HTML?

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Artificial Intelligence and I

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Mumbai Metro 3

Blog banner

What is a Malware ?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Process in OS

Blog banner

Microsoft Windows Overview

Blog banner

THREADS (assignment 1)

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

INTERRUPTS

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Blog on Smartsheet.

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Models of Information Security.

Blog banner

Deadlocks

Blog banner

Education: Key to your Prosperity

Blog banner

Supervised and unsupervised learning

Blog banner

OS ASSIGNMENT

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner