wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a geographic information system (GIS)?

profile
Ankita Gupta
Mar 16, 2023
0 Likes
0 Discussions
307 Reads

A geographic information system (GIS) consists of integrated computer hardware and software that store, manage, analyze , edit, output, and visualize geographic data. Much of this often happens within a spatial database, however, this is not essential to meet the definition of a GIS. In a broader sense, one may consider such a system also to include human users and support staff, procedures and workflows, the body of knowledge of relevant concepts and methods, and institutional organizations.

A Geographic Information System (GIS) is a computer system that analyzes and displays geographically referenced information. It uses data that is attached to a unique location.

How does GIS work?

GIS technology applies geographic science with tools for understanding and collaboration. It helps people reach a common goal: to gain actionable intelligence from all types of data.

Maps

Maps are the geographic container for the data layers and analytics you want to work with. GIS maps are easily shared and embedded in apps, and accessible by virtually everyone, everywhere.

Data

GIS integrates many different kinds of data layers using spatial location. Most data has a geographic component. GIS data includes imagery, features, and basemaps linked to spreadsheets and tables.

Analysis

Spatial analysis lets you evaluate suitability and capability, estimate and predict, interpret and understand, and much more, lending new perspectives to your insight and decision-making.

Apps

Apps provide focused user experiences for getting work done and bringing GIS to life for everyone. GIS apps work virtually everywhere: on your mobile phones, tablets, in web browsers, and on desktops.

 


Comments ()


Sign in

Read Next

SMARTSHEET

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Virtual memory

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

TRELLO

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

APACHE KAFKA

Blog banner

memory cache

Blog banner

Mumbai Metro 3

Blog banner

Computer Security

Blog banner

Cyber Security Standards

Blog banner

Cloud Security: Trends and Innovations

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Virtual memory

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

geographic information system (GIS)

Blog banner

Honeypot in cyber security

Blog banner

Goa Trip With Friends

Blog banner

URL vs Domain

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Different memory allocation strategies

Blog banner

Deadlock

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Hacking Mobile Platforms

Blog banner

Fitness

Blog banner

CRISP-DM Methodology

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

HTML vs HTML5

Blog banner

Swiggi

Blog banner

Child labour

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Dos (Denial of service) Attack

Blog banner

Starvation

Blog banner

Operating system

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Short note on expert system

Blog banner

EMAIL INVESTIGATION

Blog banner

Why we fail after giving 100% ?

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Supervised and Unsupervised Learning

Blog banner

Worms, viruses and Bots

Blog banner

Data Science & AI

Blog banner