SlideShare a Scribd company logo
Bull sharks are the most dangerous sharks in the world,
According many experts.
This is because they’re an aggressive species of shark, and they
tend to hunt in waters where people often swim: along tropical
shorelines.
Bull sharks live in shallow, warm ocean waters. They’re even
Know to swim up into freshwater rivers.
Humans are not part of a bull shark’s prey. Scientists think that
when a bull shark goes after a person it’s because the big fish
is curious or because it is simply mistakes a person for prey.
They also sometimes eat dolphins and sea turtles. Bull sharks
Even eat other sharks.
They hunt during the day and the night. Bull sharks can grow
From 7 to 11.5 feet (2.1 to 3.4 meters) in length.
Marc Vila

More Related Content

What's hot

Shark powerpoint
Shark powerpointShark powerpoint
Shark powerpoint
Google
 
Dinosaur Facts Ppt
Dinosaur Facts PptDinosaur Facts Ppt
Dinosaur Facts Ppt
Carshina Ingram
 
Whale sharks
Whale sharks Whale sharks
Whale sharks
rachel church
 
Dolphins
DolphinsDolphins
Dolphins
kamiloncha
 
Sealife
SealifeSealife
Mysteries of the world
Mysteries of the world Mysteries of the world
Mysteries of the world
SatriyaBakshi
 
A Swim Through The Sea!
A Swim Through The Sea!A Swim Through The Sea!
A Swim Through The Sea!
quaziemodo
 
Great white sharks project
Great white sharks projectGreat white sharks project
Great white sharks projecteric57
 
mysteries of the world
mysteries of the worldmysteries of the world
mysteries of the world
HIMANI GANGWAR
 
Dinosaurs
DinosaursDinosaurs
Dinosaurs
cpricenaik
 
Great barrier reef.
Great barrier reef.Great barrier reef.
Great barrier reef.
nasreen7860
 
Killer Whales
Killer WhalesKiller Whales
Killer Whales
perfectionality
 
Jelly fish
Jelly fishJelly fish
Jelly fish
Ainhoka
 
Bermuda triangle ppt
Bermuda triangle pptBermuda triangle ppt
Bermuda triangle ppt
ritikarora3
 
Endangerd marine mammals and sea birds
 Endangerd marine mammals and sea birds Endangerd marine mammals and sea birds
Endangerd marine mammals and sea birds
Harshath DG
 
Sea turtle presentation
Sea turtle presentationSea turtle presentation
Sea turtle presentationaliyahbrooke28
 

What's hot (20)

Shark powerpoint
Shark powerpointShark powerpoint
Shark powerpoint
 
Dinosaur Facts Ppt
Dinosaur Facts PptDinosaur Facts Ppt
Dinosaur Facts Ppt
 
Dinosaurs ppt with info
Dinosaurs ppt with infoDinosaurs ppt with info
Dinosaurs ppt with info
 
Sharks ppt
Sharks pptSharks ppt
Sharks ppt
 
Whale sharks
Whale sharks Whale sharks
Whale sharks
 
Dolphins
DolphinsDolphins
Dolphins
 
Sealife
SealifeSealife
Sealife
 
Mysteries of the world
Mysteries of the world Mysteries of the world
Mysteries of the world
 
A Swim Through The Sea!
A Swim Through The Sea!A Swim Through The Sea!
A Swim Through The Sea!
 
Great white sharks project
Great white sharks projectGreat white sharks project
Great white sharks project
 
mysteries of the world
mysteries of the worldmysteries of the world
mysteries of the world
 
Dinosaurs
DinosaursDinosaurs
Dinosaurs
 
Sharks
SharksSharks
Sharks
 
Wild animals: lions
Wild animals: lionsWild animals: lions
Wild animals: lions
 
Great barrier reef.
Great barrier reef.Great barrier reef.
Great barrier reef.
 
Killer Whales
Killer WhalesKiller Whales
Killer Whales
 
Jelly fish
Jelly fishJelly fish
Jelly fish
 
Bermuda triangle ppt
Bermuda triangle pptBermuda triangle ppt
Bermuda triangle ppt
 
Endangerd marine mammals and sea birds
 Endangerd marine mammals and sea birds Endangerd marine mammals and sea birds
Endangerd marine mammals and sea birds
 
Sea turtle presentation
Sea turtle presentationSea turtle presentation
Sea turtle presentation
 

More from fvendrel

Making the bees
Making the beesMaking the bees
Making the bees
fvendrel
 
Mascots ppt
Mascots pptMascots ppt
Mascots ppt
fvendrel
 
Mascots Sant Josep school, Navàs
Mascots Sant Josep school, NavàsMascots Sant Josep school, Navàs
Mascots Sant Josep school, Navàs
fvendrel
 
The killer whale
The killer whaleThe killer whale
The killer whalefvendrel
 
Dolphins armand
Dolphins armandDolphins armand
Dolphins armandfvendrel
 
Ocean animals
Ocean animalsOcean animals
Ocean animalsfvendrel
 
Sharks[1]2,3,4,5,6,7,8,910123456+236
Sharks[1]2,3,4,5,6,7,8,910123456+236Sharks[1]2,3,4,5,6,7,8,910123456+236
Sharks[1]2,3,4,5,6,7,8,910123456+236fvendrel
 
English ocean
English oceanEnglish ocean
English oceanfvendrel
 
Berlin (1)
Berlin (1)Berlin (1)
Berlin (1)fvendrel
 
Delta de l’ ebre
Delta de l’ ebreDelta de l’ ebre
Delta de l’ ebrefvendrel
 
Water experiments
Water experimentsWater experiments
Water experimentsfvendrel
 
Sstt erasmus+2015 etwinning
Sstt erasmus+2015 etwinning Sstt erasmus+2015 etwinning
Sstt erasmus+2015 etwinning fvendrel
 
Ka2+inmimation inclay
Ka2+inmimation inclayKa2+inmimation inclay
Ka2+inmimation inclayfvendrel
 
Air
Air Air
Air
fvendrel
 
Air experiments navàs catalonia
Air experiments navàs  cataloniaAir experiments navàs  catalonia
Air experiments navàs cataloniafvendrel
 
Polar bear
Polar bearPolar bear
Polar bearfvendrel
 
Ocean animals (2)
Ocean animals (2)Ocean animals (2)
Ocean animals (2)fvendrel
 

More from fvendrel (20)

Making the bees
Making the beesMaking the bees
Making the bees
 
Mascots ppt
Mascots pptMascots ppt
Mascots ppt
 
Mascots Sant Josep school, Navàs
Mascots Sant Josep school, NavàsMascots Sant Josep school, Navàs
Mascots Sant Josep school, Navàs
 
The killer whale
The killer whaleThe killer whale
The killer whale
 
Dolphins armand
Dolphins armandDolphins armand
Dolphins armand
 
Ocean animals
Ocean animalsOcean animals
Ocean animals
 
Sharks[1]2,3,4,5,6,7,8,910123456+236
Sharks[1]2,3,4,5,6,7,8,910123456+236Sharks[1]2,3,4,5,6,7,8,910123456+236
Sharks[1]2,3,4,5,6,7,8,910123456+236
 
English ocean
English oceanEnglish ocean
English ocean
 
Berlin (1)
Berlin (1)Berlin (1)
Berlin (1)
 
Delta de l’ ebre
Delta de l’ ebreDelta de l’ ebre
Delta de l’ ebre
 
Rome
RomeRome
Rome
 
Berlin
BerlinBerlin
Berlin
 
Marc v
Marc vMarc v
Marc v
 
Water experiments
Water experimentsWater experiments
Water experiments
 
Sstt erasmus+2015 etwinning
Sstt erasmus+2015 etwinning Sstt erasmus+2015 etwinning
Sstt erasmus+2015 etwinning
 
Ka2+inmimation inclay
Ka2+inmimation inclayKa2+inmimation inclay
Ka2+inmimation inclay
 
Air
Air Air
Air
 
Air experiments navàs catalonia
Air experiments navàs  cataloniaAir experiments navàs  catalonia
Air experiments navàs catalonia
 
Polar bear
Polar bearPolar bear
Polar bear
 
Ocean animals (2)
Ocean animals (2)Ocean animals (2)
Ocean animals (2)
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Power point bull sharks

  • 1.
  • 2. Bull sharks are the most dangerous sharks in the world, According many experts.
  • 3. This is because they’re an aggressive species of shark, and they tend to hunt in waters where people often swim: along tropical shorelines.
  • 4. Bull sharks live in shallow, warm ocean waters. They’re even Know to swim up into freshwater rivers.
  • 5. Humans are not part of a bull shark’s prey. Scientists think that when a bull shark goes after a person it’s because the big fish is curious or because it is simply mistakes a person for prey.
  • 6. They also sometimes eat dolphins and sea turtles. Bull sharks Even eat other sharks.
  • 7. They hunt during the day and the night. Bull sharks can grow From 7 to 11.5 feet (2.1 to 3.4 meters) in length.