wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Components of GIS

profile
Lucky Gupta
Mar 14, 2023
1 Like
0 Discussions
83 Reads

 

The 3 main components of Geographic Information Systems are:

 

1. Data

GIS stores location data as thematic layers. Each data set has an attribute table that stores information about the feature. The two main types of GIS data are raster and vector:

 

Raster Pixels

Raster

Raster data look like grids because they store data in rows and columns. They can be discrete or continuous. For example, we often represent land cover, temperature data, and imagery as raster data.

 

Editing Trace

Vector

Vectors are points, lines, and polygons with vertices. For example, fire hydrants, contours, and administrative boundaries are often vectors.


Comments ()


Sign in

Read Next

Evolution of Operating Systems

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

The application udemy

Blog banner

From Model Mistakes to Metrics

Blog banner

Is Your Password Complex Enough?

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Dekkers Algorithm

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Memory management

Blog banner

Google App Engine

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Modern operating system

Blog banner

Spotify

Blog banner

CoWIN

Blog banner

Junk food vs healthy food

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Puri Jagannath temple

Blog banner

clock

Blog banner

Social Media.

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Indian Food

Blog banner

Deadlock and starvation

Blog banner

Memory Management Techniques

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

I/O Management and Disk Scheduling

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Modern Operating Systems.

Blog banner

Service stratergy principles

Blog banner

Steganography and Steganalysis

Blog banner

What is Internet

Blog banner

Natural Language Processing(NLP)

Blog banner

SQL Injection

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

AI and cyber Security

Blog banner

How to Run your First android App

Blog banner

Data Mapping

Blog banner

Service Operations in ITSM

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Social engineering in cyber security

Blog banner