wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

geographic information system (GIS)

profile
Ameya Gawade
Mar 16, 2023
0 Likes
0 Discussions
213 Reads

A geographic information system (GIS) consists of integrated computer hardware and software that store, manage, analyze, edit, output, and visualize geographic data.[1][2] Much of this often happens within a spatial database, however, this is not essential to meet the definition of a GIS.[1] In a broader sense, one may consider such a system also to include human users and support staff, procedures and workflows, the body of knowledge of relevant concepts and methods, and institutional organizations.

The uncounted plural, geographic information systems, also abbreviated GIS, is the most common term for the industry and profession concerned with these systems. It is roughly synonymous with geoinformatics and part of the broader geospatial field, which also includes GPS, remote sensing, etc. Geographic information science, the academic discipline that studies these systems and their underlying geographic principles, may also be abbreviated as GIS, but the unambiguous GIScience is more common.[3] GIScience is often considered a subdiscipline of geography within the branch of technical geography.

History and development

While digital GIS dates to the mid-1960s, when Roger Tomlinson first coined the phrase "geographic information system",[5] many of the geographic concepts and methods that GIS automates date back decades earlier.

One of the first known instances in which spatial analysis was used came from the field of epidemiology in the "Rapport sur la marche et les effets du choléra dans Paris et le département de la Seine" (1832).[6] French geographer and cartographer, Charles Picquet created a map outlining the forty-eight Districts in Paris, using halftone color gradients, to provide a visual representation for the number of reported deaths due to cholera per every 1,000 inhabitants.


Comments ()


Sign in

Read Next

Digital black market or dark net poses a national security threat?

Blog banner

Uniprocessor Scheduling

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Virtual memory in windows

Blog banner

Virtualisation

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Virtual Machine

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

virtual machine

Blog banner

IOT Hacking Techniques

Blog banner

INTERRUPTS

Blog banner

INTERNET SECURITY

Blog banner

Sage

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Evolution of Operating Sytems

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Memory Management

Blog banner

Elements and Principles of Photography

Blog banner

Elegant fashion style

Blog banner

SQL Injection

Blog banner

Threads in OS

Blog banner

TEAMWORK

Blog banner

Note Taker App

Blog banner

"Games and the future"

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Service Operations Principles

Blog banner

What is M-commerce and how it's work

Blog banner

IT GOVERNANCE

Blog banner

What is Packet Filtering?

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Zomato (Income Sources)

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Deadlock and Starvation

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Uniprocessor Scheduling

Blog banner

The Features of Blockchain

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

STARVATION

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

HACKING MOBILE PLATFORM

Blog banner