SlideShare a Scribd company logo
The australian furseal




            Lara Santiago Martin
Description
Females                          Males
  Weighing up to 100 kgs and       Weighs up to 360kgs and have
  have got approximately 1,7       got approximately 2 meters
  meters long.The lifespan of an   long. The lifespan of an
  Australian Fur Seal female is    Australian Fur Seal male is
  roughly 21 years.                roughly 19 years
Location and habitat
Australian Fur Seals are in Bass
  Strait between Victoria and
  Tasmania and small patches off
  the coast of New South Wales
  and South Australia Breeding
  now occurs at only 9 sites, all in
  Bass Strait.
Food
Their prefered prey are squid and
  small fish, such as schools of
  pilchards or mackerel
Protection
The Australian Federal Government and State Governments have
passed laws making it illegal to kill, hurt or harass any Australian
Fur Seal or even own or sell any fur seal parts or products. All the
breeding sites are protected wildlife reserves.
Interesting fat.
The fur seal is an extremely good swimmer and diver and moves eloquently through its
   marine enviroment. The same can not be said for its movement across land where it
   uses its four flippers in a variety of gaits and waddles to move at speeds from a slow
   walk to a fast gallop.
Goodbye

More Related Content

What's hot

Sea horses
Sea horsesSea horses
Sea horseskakapo1
 
Mya 2014
Mya 2014Mya 2014
Mya 2014
teachroom207
 
Killer whale
Killer whaleKiller whale
Killer whale
AbdulBari220493
 
Whale sharks
Whale sharks Whale sharks
Whale sharks
rachel church
 
Great White Shark
Great White SharkGreat White Shark
Great White SharkGenWheatley
 
Clown fish by Paula
Clown fish by PaulaClown fish by Paula
Clown fish by Paula
Loli García
 
Coral Reefs Susquenita
Coral Reefs SusquenitaCoral Reefs Susquenita
Coral Reefs SusquenitaSusquenita
 
Where animals live
Where animals liveWhere animals live
Where animals livelolijisa
 
Grupo 2. scotland
Grupo 2. scotlandGrupo 2. scotland
Grupo 2. scotlandjuanrogo2
 
Kesten t bengal tiger
Kesten t bengal tigerKesten t bengal tiger
Kesten t bengal tigerginageo65
 
Caelyn Murdaugh penguin 1
Caelyn Murdaugh penguin 1Caelyn Murdaugh penguin 1
Caelyn Murdaugh penguin 1buchmannbio2011
 
Reptiles, fish and amphibians
Reptiles, fish and amphibiansReptiles, fish and amphibians
Reptiles, fish and amphibianslolijisa
 
Emperor penguin project
Emperor penguin projectEmperor penguin project
Emperor penguin projectiteclearners
 

What's hot (20)

Sea horses
Sea horsesSea horses
Sea horses
 
Mya 2014
Mya 2014Mya 2014
Mya 2014
 
Killer whale
Killer whaleKiller whale
Killer whale
 
The Ultimate Preditor
The Ultimate PreditorThe Ultimate Preditor
The Ultimate Preditor
 
Australia
AustraliaAustralia
Australia
 
Seahorses
SeahorsesSeahorses
Seahorses
 
Bactrian camel
Bactrian camelBactrian camel
Bactrian camel
 
Annamarie 2014
Annamarie   2014Annamarie   2014
Annamarie 2014
 
Whale sharks
Whale sharks Whale sharks
Whale sharks
 
Animals
AnimalsAnimals
Animals
 
Great White Shark
Great White SharkGreat White Shark
Great White Shark
 
Clown fish by Paula
Clown fish by PaulaClown fish by Paula
Clown fish by Paula
 
Coral Reefs Susquenita
Coral Reefs SusquenitaCoral Reefs Susquenita
Coral Reefs Susquenita
 
Where animals live
Where animals liveWhere animals live
Where animals live
 
Grupo 2. scotland
Grupo 2. scotlandGrupo 2. scotland
Grupo 2. scotland
 
Kesten t bengal tiger
Kesten t bengal tigerKesten t bengal tiger
Kesten t bengal tiger
 
Caelyn Murdaugh penguin 1
Caelyn Murdaugh penguin 1Caelyn Murdaugh penguin 1
Caelyn Murdaugh penguin 1
 
Reptiles, fish and amphibians
Reptiles, fish and amphibiansReptiles, fish and amphibians
Reptiles, fish and amphibians
 
Emperor penguin project
Emperor penguin projectEmperor penguin project
Emperor penguin project
 
Nz falcon
Nz falconNz falcon
Nz falcon
 

Viewers also liked

Melbourne (1)
Melbourne (1)Melbourne (1)
Melbourne (1)nforns2
 
Photo quiz
Photo quizPhoto quiz
Photo quiznforns2
 
Red kangaroo(2)
Red kangaroo(2)Red kangaroo(2)
Red kangaroo(2)nforns2
 
Salt water crocodile
Salt water crocodileSalt water crocodile
Salt water crocodilenforns2
 
Thorny devil (ingles)
Thorny devil (ingles)Thorny devil (ingles)
Thorny devil (ingles)nforns2
 
The western swamp tortoise
The western swamp tortoiseThe western swamp tortoise
The western swamp tortoisenforns2
 
Connectingclassrooms
ConnectingclassroomsConnectingclassrooms
Connectingclassroomsnforns2
 
Lumholtz tree kangaroo
Lumholtz tree kangarooLumholtz tree kangaroo
Lumholtz tree kangaroonforns2
 
Sydney
Sydney Sydney
Sydney
nforns2
 
EF6 and DDD
EF6 and DDDEF6 and DDD
EF6 and DDD
Hrvoje Hudoletnjak
 
Open source and .net
Open source and .netOpen source and .net
Open source and .net
Hrvoje Hudoletnjak
 
Wallaroo
WallarooWallaroo
Wallaroonforns2
 
Intro 1 eso
Intro 1 esoIntro 1 eso
Intro 1 eso
nforns2
 
Bottlenose dolphin
Bottlenose dolphinBottlenose dolphin
Bottlenose dolphinnforns2
 
My weekend startup: seocrawler.co
My weekend startup: seocrawler.coMy weekend startup: seocrawler.co
My weekend startup: seocrawler.co
Hrvoje Hudoletnjak
 
ATD9 2013 One ASP.NET
ATD9 2013 One ASP.NETATD9 2013 One ASP.NET
ATD9 2013 One ASP.NET
Hrvoje Hudoletnjak
 
Project K, Vnext and Owin
Project K, Vnext and OwinProject K, Vnext and Owin
Project K, Vnext and Owin
Hrvoje Hudoletnjak
 

Viewers also liked (20)

Melbourne (1)
Melbourne (1)Melbourne (1)
Melbourne (1)
 
Photo quiz
Photo quizPhoto quiz
Photo quiz
 
Red kangaroo(2)
Red kangaroo(2)Red kangaroo(2)
Red kangaroo(2)
 
Salt water crocodile
Salt water crocodileSalt water crocodile
Salt water crocodile
 
Thorny devil (ingles)
Thorny devil (ingles)Thorny devil (ingles)
Thorny devil (ingles)
 
Wombat
WombatWombat
Wombat
 
Sawfish
SawfishSawfish
Sawfish
 
The western swamp tortoise
The western swamp tortoiseThe western swamp tortoise
The western swamp tortoise
 
Connectingclassrooms
ConnectingclassroomsConnectingclassrooms
Connectingclassrooms
 
Lumholtz tree kangaroo
Lumholtz tree kangarooLumholtz tree kangaroo
Lumholtz tree kangaroo
 
Sydney
Sydney Sydney
Sydney
 
EF6 and DDD
EF6 and DDDEF6 and DDD
EF6 and DDD
 
Open source and .net
Open source and .netOpen source and .net
Open source and .net
 
Cairns
CairnsCairns
Cairns
 
Wallaroo
WallarooWallaroo
Wallaroo
 
Intro 1 eso
Intro 1 esoIntro 1 eso
Intro 1 eso
 
Bottlenose dolphin
Bottlenose dolphinBottlenose dolphin
Bottlenose dolphin
 
My weekend startup: seocrawler.co
My weekend startup: seocrawler.coMy weekend startup: seocrawler.co
My weekend startup: seocrawler.co
 
ATD9 2013 One ASP.NET
ATD9 2013 One ASP.NETATD9 2013 One ASP.NET
ATD9 2013 One ASP.NET
 
Project K, Vnext and Owin
Project K, Vnext and OwinProject K, Vnext and Owin
Project K, Vnext and Owin
 

Similar to Powerpoint australian furseal

Tasmanian devil power point
Tasmanian devil power pointTasmanian devil power point
Tasmanian devil power pointkratka70
 
ANIMALES - informacion para educacion ambiental y juegos
ANIMALES - informacion para educacion ambiental y juegosANIMALES - informacion para educacion ambiental y juegos
ANIMALES - informacion para educacion ambiental y juegos
Fabian878220
 
The australian sea lion [recovered]
The australian sea lion [recovered]The australian sea lion [recovered]
The australian sea lion [recovered]y3ehps
 
5 of the strangest animals
5 of the strangest animals5 of the strangest animals
5 of the strangest animals
Ash_at_Adams
 
Jo Carswell S Tasmanian Native Hens
Jo  Carswell S  Tasmanian  Native  HensJo  Carswell S  Tasmanian  Native  Hens
Jo Carswell S Tasmanian Native HensLeonie atkins
 
Animals that seem make believe
Animals that seem make believeAnimals that seem make believe
Animals that seem make believe
JoanneFrawley
 
Australian sea lion
Australian sea lionAustralian sea lion
Australian sea liony3ehps
 
Whale shark ppt
Whale shark pptWhale shark ppt
Whale shark ppt
HSCoachWifeNTX
 
What is a Turtle
What is a TurtleWhat is a Turtle
What is a Turtle
Alvin Chew
 
Australian animals
Australian animalsAustralian animals
Australian animals
patablanca
 
Whale shark
Whale sharkWhale shark
Whale shark
extreme shark facts
 
The western swamp tortoise
The western swamp tortoiseThe western swamp tortoise
The western swamp tortoisealvdoman
 
The thylacine
The thylacineThe thylacine
The thylacine
danishhakim
 
The thylacine
The thylacineThe thylacine
The thylacine
danishhakim
 
The thylacine
The thylacineThe thylacine
The thylacine
danishhakim
 
Animals by Juuli & Anni
Animals by Juuli & AnniAnimals by Juuli & Anni
Animals by Juuli & AnniAtso Karhi
 
Save the tuna
Save the tuna Save the tuna
Save the tuna 13gyou
 

Similar to Powerpoint australian furseal (20)

Tasmanian devil power point
Tasmanian devil power pointTasmanian devil power point
Tasmanian devil power point
 
ANIMALES - informacion para educacion ambiental y juegos
ANIMALES - informacion para educacion ambiental y juegosANIMALES - informacion para educacion ambiental y juegos
ANIMALES - informacion para educacion ambiental y juegos
 
Wildlife in australia
Wildlife in australiaWildlife in australia
Wildlife in australia
 
Wildlife in australia
Wildlife in australiaWildlife in australia
Wildlife in australia
 
The australian sea lion [recovered]
The australian sea lion [recovered]The australian sea lion [recovered]
The australian sea lion [recovered]
 
5 of the strangest animals
5 of the strangest animals5 of the strangest animals
5 of the strangest animals
 
Jo Carswell S Tasmanian Native Hens
Jo  Carswell S  Tasmanian  Native  HensJo  Carswell S  Tasmanian  Native  Hens
Jo Carswell S Tasmanian Native Hens
 
Animals that seem make believe
Animals that seem make believeAnimals that seem make believe
Animals that seem make believe
 
Australian sea lion
Australian sea lionAustralian sea lion
Australian sea lion
 
Whale shark ppt
Whale shark pptWhale shark ppt
Whale shark ppt
 
What is a Turtle
What is a TurtleWhat is a Turtle
What is a Turtle
 
Australian animals
Australian animalsAustralian animals
Australian animals
 
Whale shark
Whale sharkWhale shark
Whale shark
 
The western swamp tortoise
The western swamp tortoiseThe western swamp tortoise
The western swamp tortoise
 
The thylacine
The thylacineThe thylacine
The thylacine
 
The thylacine
The thylacineThe thylacine
The thylacine
 
The thylacine
The thylacineThe thylacine
The thylacine
 
The thylacine
The thylacineThe thylacine
The thylacine
 
Animals by Juuli & Anni
Animals by Juuli & AnniAnimals by Juuli & Anni
Animals by Juuli & Anni
 
Save the tuna
Save the tuna Save the tuna
Save the tuna
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Powerpoint australian furseal

  • 1. The australian furseal Lara Santiago Martin
  • 2. Description Females Males Weighing up to 100 kgs and Weighs up to 360kgs and have have got approximately 1,7 got approximately 2 meters meters long.The lifespan of an long. The lifespan of an Australian Fur Seal female is Australian Fur Seal male is roughly 21 years. roughly 19 years
  • 3. Location and habitat Australian Fur Seals are in Bass Strait between Victoria and Tasmania and small patches off the coast of New South Wales and South Australia Breeding now occurs at only 9 sites, all in Bass Strait.
  • 4. Food Their prefered prey are squid and small fish, such as schools of pilchards or mackerel
  • 5. Protection The Australian Federal Government and State Governments have passed laws making it illegal to kill, hurt or harass any Australian Fur Seal or even own or sell any fur seal parts or products. All the breeding sites are protected wildlife reserves.
  • 6. Interesting fat. The fur seal is an extremely good swimmer and diver and moves eloquently through its marine enviroment. The same can not be said for its movement across land where it uses its four flippers in a variety of gaits and waddles to move at speeds from a slow walk to a fast gallop.