SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Animal Life By Stacy Forgacs
[object Object],[object Object],Black Bear Cheetah Ah, Ha Sources
Ah, Ha ,[object Object],Main Menu
True or false? Gray wolves fur is always Gray. ,[object Object],False
Correct!!! ,[object Object],Click for more information on gray wolves.
Did you know? ,[object Object],[object Object],Main Menu
Sorry, incorrect! ,[object Object],Click arrow for more information on gray wolves.
Black bear’s diet is: ,[object Object],25% vegetation
Oops Wrong! ,[object Object],What else?
Right On!!! ,[object Object],Find out more!
Bear/Human interaction: ,[object Object],[object Object],[object Object],Back to main menu
Sources ,[object Object],[object Object],[object Object]
The Cat’s Meow ,[object Object],Yes No
Bulls Eye!!! “ The cheetah cannot roar, but does have the following vocalizations: Chirping  - When cheetahs attempt to find each other, or a mother tries to locate her cubs, it uses a high-pitched barking called chirping. The chirps made by a cheetah cub sound more like a bird chirping, and so are termed  chirping .  Churring  or  stuttering  - This vocalization is emitted by a cheetah during social meetings. A churr can be seen as a social invitation to other cheetahs, an expression of interest, uncertainty, or appeasement or during meetings with the opposite sex (although each sex churrs for different reasons).  Growling  - This vocalization is often accompanied by hissing and spitting and is exhibited by the cheetah during annoyance, or when faced with danger.  Yowling  - This is an escalated version of growling, usually displayed when danger worsens.  Purring  - This is made when the cheetah is content, usually during pleasant social meetings (mostly between cubs and their mothers). A characteristic of purring is that it is realised on both egressive and ingressive airstream. A purring cheetah can be heard on Robert Eklund's Ingressive Speech website or on Robert Eklund's Wildlife page .” (Wikipedia,2010) More Info
So close yet so far! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Find out more
On the hunt. ,[object Object],[object Object],Main Menu

Contenu connexe

En vedette

All in a bears life
All in a bears lifeAll in a bears life
All in a bears lifeChuck Crouse
 
Connecting health to our natural resources
Connecting health to our natural resourcesConnecting health to our natural resources
Connecting health to our natural resourcesgbeltalliance
 
Black bears, and brown bears, and
Black bears, and brown bears, andBlack bears, and brown bears, and
Black bears, and brown bears, andStephanie King
 
Behavior of small ruminant animals
Behavior of small ruminant animalsBehavior of small ruminant animals
Behavior of small ruminant animalsPriyanka Meena
 
All about Elephants
All about ElephantsAll about Elephants
All about Elephantskefiore
 
Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...Fanus van Straten
 
Behavioural ecology of fishes
Behavioural ecology of fishesBehavioural ecology of fishes
Behavioural ecology of fishesManju Shree
 
Reproductive behaviour: 1-Sexual behaviour in animals
Reproductive behaviour: 1-Sexual behaviour in animalsReproductive behaviour: 1-Sexual behaviour in animals
Reproductive behaviour: 1-Sexual behaviour in animalsrhfayed
 
African elephant powerpoint
African elephant powerpointAfrican elephant powerpoint
African elephant powerpointReuben Soares
 

En vedette (15)

All in a bears life
All in a bears lifeAll in a bears life
All in a bears life
 
Bears
BearsBears
Bears
 
Black Bears
Black BearsBlack Bears
Black Bears
 
Connecting health to our natural resources
Connecting health to our natural resourcesConnecting health to our natural resources
Connecting health to our natural resources
 
Black bears, and brown bears, and
Black bears, and brown bears, andBlack bears, and brown bears, and
Black bears, and brown bears, and
 
Behavior of small ruminant animals
Behavior of small ruminant animalsBehavior of small ruminant animals
Behavior of small ruminant animals
 
All about Elephants
All about ElephantsAll about Elephants
All about Elephants
 
Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...Position Statement on the Use of Dominance Theory in Behavior Modification of...
Position Statement on the Use of Dominance Theory in Behavior Modification of...
 
Behavioral Ecology
Behavioral EcologyBehavioral Ecology
Behavioral Ecology
 
Elephant Presentation
Elephant PresentationElephant Presentation
Elephant Presentation
 
Behavioural ecology of fishes
Behavioural ecology of fishesBehavioural ecology of fishes
Behavioural ecology of fishes
 
Reproductive behaviour: 1-Sexual behaviour in animals
Reproductive behaviour: 1-Sexual behaviour in animalsReproductive behaviour: 1-Sexual behaviour in animals
Reproductive behaviour: 1-Sexual behaviour in animals
 
African elephant powerpoint
African elephant powerpointAfrican elephant powerpoint
African elephant powerpoint
 
Migration in fishes
Migration in fishesMigration in fishes
Migration in fishes
 
Animal welfare
Animal welfareAnimal welfare
Animal welfare
 

Similaire à Animal Life (11)

Owl Pellets
Owl PelletsOwl Pellets
Owl Pellets
 
Hyena Facts
Hyena FactsHyena Facts
Hyena Facts
 
Evolution-Presentation grade 12.ppt
Evolution-Presentation grade 12.pptEvolution-Presentation grade 12.ppt
Evolution-Presentation grade 12.ppt
 
evolution of life on Earth..............
evolution of life on Earth..............evolution of life on Earth..............
evolution of life on Earth..............
 
Evolution-Presentation784375847jjfws87.ppt
Evolution-Presentation784375847jjfws87.pptEvolution-Presentation784375847jjfws87.ppt
Evolution-Presentation784375847jjfws87.ppt
 
Quolls
QuollsQuolls
Quolls
 
HansenK_PrimaLinguaProject
HansenK_PrimaLinguaProjectHansenK_PrimaLinguaProject
HansenK_PrimaLinguaProject
 
Deer Hunting Inquiry 4
Deer Hunting Inquiry 4Deer Hunting Inquiry 4
Deer Hunting Inquiry 4
 
5 G Gray Wolf
5 G Gray Wolf5 G Gray Wolf
5 G Gray Wolf
 
Dogs
DogsDogs
Dogs
 
Arguments For Cloning Extinct Species
Arguments For Cloning Extinct SpeciesArguments For Cloning Extinct Species
Arguments For Cloning Extinct Species
 

Dernier

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Animal Life

  • 1. Animal Life By Stacy Forgacs
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Bulls Eye!!! “ The cheetah cannot roar, but does have the following vocalizations: Chirping - When cheetahs attempt to find each other, or a mother tries to locate her cubs, it uses a high-pitched barking called chirping. The chirps made by a cheetah cub sound more like a bird chirping, and so are termed chirping . Churring or stuttering - This vocalization is emitted by a cheetah during social meetings. A churr can be seen as a social invitation to other cheetahs, an expression of interest, uncertainty, or appeasement or during meetings with the opposite sex (although each sex churrs for different reasons). Growling - This vocalization is often accompanied by hissing and spitting and is exhibited by the cheetah during annoyance, or when faced with danger. Yowling - This is an escalated version of growling, usually displayed when danger worsens. Purring - This is made when the cheetah is content, usually during pleasant social meetings (mostly between cubs and their mothers). A characteristic of purring is that it is realised on both egressive and ingressive airstream. A purring cheetah can be heard on Robert Eklund's Ingressive Speech website or on Robert Eklund's Wildlife page .” (Wikipedia,2010) More Info
  • 15.
  • 16.