SlideShare a Scribd company logo
Een gezond gebit Een goed gebit is een goede eerste indruk!
Wat is tandplak? ,[object Object],[object Object],[object Object]
Wat is tandplak? ,[object Object],[object Object],[object Object]
Wat is een andere naam voor tandplak? ,[object Object],[object Object],[object Object]
Wat is een andere naam voor tandplak? ,[object Object],[object Object],[object Object]
Waar komen de bacteriën die tandplak veroorzaken vandaan? ,[object Object],[object Object],[object Object]
Waar komen de bacteriën die tandplak veroorzaken vandaan? ,[object Object],[object Object],[object Object]
Waar hechten de bacteriën zich vooral in je mond? ,[object Object],[object Object],[object Object]
Waar hechten de bacteriën zich vooral in je mond? ,[object Object],[object Object],[object Object]
Waarom is tandplak de grootste vijand van een gezond gebit? ,[object Object],[object Object],[object Object]
Waarom is tandplak de grootste vijand van een gezond gebit? ,[object Object],[object Object],[object Object]
Kan je de vorming van tandplak tegen gaan? ,[object Object],[object Object],[object Object]
Kan je de vorming van tandplak tegen gaan? ,[object Object],[object Object],[object Object]
Hoe vaak moet je per dag je tanden poetsen? ,[object Object],[object Object],[object Object]
Hoe vaak moet je per dag je tanden poetsen? ,[object Object],[object Object],[object Object]
Hoe lang moet je wachten met tanden poetsen na de maaltijd? ,[object Object],[object Object],[object Object]
Hoe lang moet je wachten met tanden poetsen na de maaltijd? ,[object Object],[object Object],[object Object]
“ Het maakt voor je tanden niet uit of je een reep chocola in één keer op eet of elk half uur een stukje.” ,[object Object],[object Object]
“ Het maakt voor je tanden niet uit of je een reep chocola in één keer op eet of elk half uur een stukje.” ,[object Object],[object Object]

More Related Content

Viewers also liked

Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014
Rodrigo Montoro
 
Cedar Ridge Weekly Report
Cedar Ridge Weekly ReportCedar Ridge Weekly Report
Cedar Ridge Weekly Reportclstutts
 
Creating a personal narrative
Creating a personal narrativeCreating a personal narrative
Creating a personal narrativeEmily Kissner
 
Open Development
Open DevelopmentOpen Development
Open Development
Paolo Mottadelli
 
DevOps at Crevise Technologies
DevOps at Crevise TechnologiesDevOps at Crevise Technologies
DevOps at Crevise Technologies
Crevise Technologies
 
DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2
Outlyer
 
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at ScaleMetrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at ScaleSematext Group, Inc.
 
Astricon 2016 - Scaling ARI and Production
Astricon 2016 - Scaling ARI and ProductionAstricon 2016 - Scaling ARI and Production
Astricon 2016 - Scaling ARI and Production
Dan Jenkins
 
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
OpenWhisk
 
WTF is Sensu and Monitoring
WTF is Sensu and MonitoringWTF is Sensu and Monitoring
WTF is Sensu and Monitoring
Toby Jackson
 
Cloud adoption patterns
Cloud adoption patternsCloud adoption patterns
Cloud adoption patterns
Kyle Brown
 
Tic’s y enfermería
Tic’s y enfermeríaTic’s y enfermería
Tic’s y enfermería
Valentina Arboleda
 
Dialogue Assessment
Dialogue AssessmentDialogue Assessment
Dialogue Assessment
Emily Kissner
 
An Introduction to event sourcing and CQRS
An Introduction to event sourcing and CQRSAn Introduction to event sourcing and CQRS
An Introduction to event sourcing and CQRS
Haufe-Lexware GmbH & Co KG
 
Yellowstone National Park and Grand Teton, USA
Yellowstone  National Park and Grand Teton, USAYellowstone  National Park and Grand Teton, USA
Yellowstone National Park and Grand Teton, USA
Cherie Ng
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
Cysinfo Cyber Security Community
 
IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...
IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...
IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...
OpenWhisk
 
Aws security with HIDS using Ossec
Aws security with HIDS using OssecAws security with HIDS using Ossec
Aws security with HIDS using Ossec
Gaurav Harsola
 

Viewers also liked (19)

Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014
 
Cedar Ridge Weekly Report
Cedar Ridge Weekly ReportCedar Ridge Weekly Report
Cedar Ridge Weekly Report
 
Creating a personal narrative
Creating a personal narrativeCreating a personal narrative
Creating a personal narrative
 
Open Development
Open DevelopmentOpen Development
Open Development
 
DevOps at Crevise Technologies
DevOps at Crevise TechnologiesDevOps at Crevise Technologies
DevOps at Crevise Technologies
 
DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2DOXLON November 2016: Facebook Engineering on cgroupv2
DOXLON November 2016: Facebook Engineering on cgroupv2
 
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at ScaleMetrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
 
Astricon 2016 - Scaling ARI and Production
Astricon 2016 - Scaling ARI and ProductionAstricon 2016 - Scaling ARI and Production
Astricon 2016 - Scaling ARI and Production
 
Mohamed Ahmed Abdelkhalek
Mohamed Ahmed AbdelkhalekMohamed Ahmed Abdelkhalek
Mohamed Ahmed Abdelkhalek
 
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
 
WTF is Sensu and Monitoring
WTF is Sensu and MonitoringWTF is Sensu and Monitoring
WTF is Sensu and Monitoring
 
Cloud adoption patterns
Cloud adoption patternsCloud adoption patterns
Cloud adoption patterns
 
Tic’s y enfermería
Tic’s y enfermeríaTic’s y enfermería
Tic’s y enfermería
 
Dialogue Assessment
Dialogue AssessmentDialogue Assessment
Dialogue Assessment
 
An Introduction to event sourcing and CQRS
An Introduction to event sourcing and CQRSAn Introduction to event sourcing and CQRS
An Introduction to event sourcing and CQRS
 
Yellowstone National Park and Grand Teton, USA
Yellowstone  National Park and Grand Teton, USAYellowstone  National Park and Grand Teton, USA
Yellowstone National Park and Grand Teton, USA
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
 
IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...
IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...
IBM Bluemix OpenWhisk: Serverless Conference 2016, London, UK: The Future of ...
 
Aws security with HIDS using Ossec
Aws security with HIDS using OssecAws security with HIDS using Ossec
Aws security with HIDS using Ossec
 

Een Gezond Gebit2

  • 1. Een gezond gebit Een goed gebit is een goede eerste indruk!
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.