wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a geographic information system (GIS)?

profile
Ankita Gupta
Mar 16, 2023
0 Likes
0 Discussions
307 Reads

A geographic information system (GIS) consists of integrated computer hardware and software that store, manage, analyze , edit, output, and visualize geographic data. Much of this often happens within a spatial database, however, this is not essential to meet the definition of a GIS. In a broader sense, one may consider such a system also to include human users and support staff, procedures and workflows, the body of knowledge of relevant concepts and methods, and institutional organizations.

A Geographic Information System (GIS) is a computer system that analyzes and displays geographically referenced information. It uses data that is attached to a unique location.

How does GIS work?

GIS technology applies geographic science with tools for understanding and collaboration. It helps people reach a common goal: to gain actionable intelligence from all types of data.

Maps

Maps are the geographic container for the data layers and analytics you want to work with. GIS maps are easily shared and embedded in apps, and accessible by virtually everyone, everywhere.

Data

GIS integrates many different kinds of data layers using spatial location. Most data has a geographic component. GIS data includes imagery, features, and basemaps linked to spreadsheets and tables.

Analysis

Spatial analysis lets you evaluate suitability and capability, estimate and predict, interpret and understand, and much more, lending new perspectives to your insight and decision-making.

Apps

Apps provide focused user experiences for getting work done and bringing GIS to life for everyone. GIS apps work virtually everywhere: on your mobile phones, tablets, in web browsers, and on desktops.

 


Comments ()


Sign in

Read Next

History of ITIL

Blog banner

SAVE TREES

Blog banner

Operation system

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Mariana Trench: The deepest depths

Blog banner

File Management

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Scala - a programming tool

Blog banner

TEAMWORK

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Evolution of Operating system

Blog banner

How to Run your First android App

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Sessions In OS.

Blog banner

Layers Of Blockchain

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Modern Operating System

Blog banner

Why is online marketing is important in current scenario

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Ransomware

Blog banner

Importance Of Blockchain

Blog banner

Veg Mix Pickle

Blog banner

DATA VAULT

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

memory managment

Blog banner

Harsh Rathod

Blog banner

Memory Hierarchy

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

The most common internet security threats

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Evolution of Operating system

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Data Lake

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Culture Of Ladakh

Blog banner

Data carving - using hex editor

Blog banner

RACI model in IT services

Blog banner

Spyware

Blog banner