SlideShare ist ein Scribd-Unternehmen logo
1 von 16
How to identify venomous snakes in Texas
Most snakes are not aggressive Most people are bitten by snakes trying to get a better look. 	 Of the snake bites that occur in the US each year, only 16% are from venomous species.
Identifying snakes from body characteristics
Venomous snakes have triangular heads Non venomous Venomous
Venomous snakes have elliptical pupils Non venomous Venomous
Venomous snakes have a single row of scales under their tail Non venomous Venomous
Venomous snakes leave a distinct bite mark Non venomous Venomous
Identifying snakes that mimic venomous snakes
These harmless snakes mimic the venomous Coral Snake Milksnake Eastern Kingsnake
Common venomous snakes in Texas
The Rattlesnake
The coral snake
The copperhead
The cottonmouth
How to identify venomous snakes in Texas
http://www.ces.ncsu.edu/gaston/Pests/reptiles/venompix.htm http://www.alabamaherps.com/snake%20bite.htm#helpavoid http://nationalzoo.si.edu/Animals/ReptilesAmphibians/Facts/FactSheets/Cottonmouth.cfm http://www.tpwd.state.tx.us/learning/junior_naturalists/snakefaq.phtml

Weitere ähnliche Inhalte

Was ist angesagt?

hidrosefalus nra (fitria, francisca, hernik)
hidrosefalus nra (fitria, francisca, hernik)hidrosefalus nra (fitria, francisca, hernik)
hidrosefalus nra (fitria, francisca, hernik)fitriarachmawati
 
Tenosynovitis supuratif
Tenosynovitis supuratifTenosynovitis supuratif
Tenosynovitis supuratifvonysafitri
 
Polar bear ppt
Polar bear pptPolar bear ppt
Polar bear pptKati W
 
Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ...
 Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ... Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ...
Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ...Ghosiyah Malik
 
Bioekologi dan morfologi 1
Bioekologi dan morfologi 1Bioekologi dan morfologi 1
Bioekologi dan morfologi 1Semiani Satsuki
 
Presentation On Rhinoceros by SAIFUL
Presentation On Rhinoceros by SAIFULPresentation On Rhinoceros by SAIFUL
Presentation On Rhinoceros by SAIFULMd. Saiful Islam
 
Infeksi saluran kemih
Infeksi saluran kemihInfeksi saluran kemih
Infeksi saluran kemihKindal
 
Ikan Napoleon Berstatus Dilindungi
Ikan Napoleon Berstatus DilindungiIkan Napoleon Berstatus Dilindungi
Ikan Napoleon Berstatus DilindungiDidi Sadili
 
Pim1221 b 1 ruang lingkup penangkapan ikan
Pim1221 b 1 ruang lingkup penangkapan ikanPim1221 b 1 ruang lingkup penangkapan ikan
Pim1221 b 1 ruang lingkup penangkapan ikanPT. SASA
 
Budidaya ikan hias clown fish
Budidaya ikan hias clown fishBudidaya ikan hias clown fish
Budidaya ikan hias clown fishiin hamzah
 

Was ist angesagt? (20)

hidrosefalus nra (fitria, francisca, hernik)
hidrosefalus nra (fitria, francisca, hernik)hidrosefalus nra (fitria, francisca, hernik)
hidrosefalus nra (fitria, francisca, hernik)
 
Tenosynovitis supuratif
Tenosynovitis supuratifTenosynovitis supuratif
Tenosynovitis supuratif
 
Diagnosis tumor otak
Diagnosis tumor otakDiagnosis tumor otak
Diagnosis tumor otak
 
Pengantar limnologi
Pengantar limnologiPengantar limnologi
Pengantar limnologi
 
Polar bear ppt
Polar bear pptPolar bear ppt
Polar bear ppt
 
Xii tkj 2 hiv aids
Xii tkj 2 hiv aidsXii tkj 2 hiv aids
Xii tkj 2 hiv aids
 
Skabies
SkabiesSkabies
Skabies
 
Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ...
 Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ... Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ...
Lion Presentation - Panthera Leo (African Lion) | Characteristics, Habitat, ...
 
Bioekologi dan morfologi 1
Bioekologi dan morfologi 1Bioekologi dan morfologi 1
Bioekologi dan morfologi 1
 
Giraffes
GiraffesGiraffes
Giraffes
 
TASMANIAN DEVIL
TASMANIAN DEVILTASMANIAN DEVIL
TASMANIAN DEVIL
 
Presentation On Rhinoceros by SAIFUL
Presentation On Rhinoceros by SAIFULPresentation On Rhinoceros by SAIFUL
Presentation On Rhinoceros by SAIFUL
 
Infeksi saluran kemih
Infeksi saluran kemihInfeksi saluran kemih
Infeksi saluran kemih
 
Ikan Napoleon Berstatus Dilindungi
Ikan Napoleon Berstatus DilindungiIkan Napoleon Berstatus Dilindungi
Ikan Napoleon Berstatus Dilindungi
 
Jellyfish
JellyfishJellyfish
Jellyfish
 
Pim1221 b 1 ruang lingkup penangkapan ikan
Pim1221 b 1 ruang lingkup penangkapan ikanPim1221 b 1 ruang lingkup penangkapan ikan
Pim1221 b 1 ruang lingkup penangkapan ikan
 
Atresia esofagus
Atresia esofagusAtresia esofagus
Atresia esofagus
 
Budidaya ikan hias clown fish
Budidaya ikan hias clown fishBudidaya ikan hias clown fish
Budidaya ikan hias clown fish
 
Kista ginjal
Kista ginjalKista ginjal
Kista ginjal
 
Filariasis
FilariasisFilariasis
Filariasis
 

Ähnlich wie Online presentation

Ähnlich wie Online presentation (20)

Final online
Final onlineFinal online
Final online
 
Snake Notes
Snake NotesSnake Notes
Snake Notes
 
Spiders facts-activity
Spiders facts-activitySpiders facts-activity
Spiders facts-activity
 
Critters
CrittersCritters
Critters
 
Spiders
SpidersSpiders
Spiders
 
Spiders
SpidersSpiders
Spiders
 
Lizard Notes
Lizard NotesLizard Notes
Lizard Notes
 
Insect Morphology And Identification Carlton
Insect Morphology And Identification CarltonInsect Morphology And Identification Carlton
Insect Morphology And Identification Carlton
 
Zoropsis Spider Integrated Pest Management
Zoropsis Spider Integrated Pest ManagementZoropsis Spider Integrated Pest Management
Zoropsis Spider Integrated Pest Management
 
Amphibians
AmphibiansAmphibians
Amphibians
 
Essay Ekonomi Pembangunan. Online assignment writing service.
Essay Ekonomi Pembangunan. Online assignment writing service.Essay Ekonomi Pembangunan. Online assignment writing service.
Essay Ekonomi Pembangunan. Online assignment writing service.
 
Presentation4
Presentation4Presentation4
Presentation4
 
Presentation4
Presentation4Presentation4
Presentation4
 
Phylum Nematoda Notes
Phylum  Nematoda NotesPhylum  Nematoda Notes
Phylum Nematoda Notes
 
Snakes
SnakesSnakes
Snakes
 
Classification of Animals - Vertebrates and Invertebrates with activity.pdf
Classification of Animals - Vertebrates and Invertebrates with activity.pdfClassification of Animals - Vertebrates and Invertebrates with activity.pdf
Classification of Animals - Vertebrates and Invertebrates with activity.pdf
 
Cottonmouth brochure
Cottonmouth brochureCottonmouth brochure
Cottonmouth brochure
 
animal species
animal speciesanimal species
animal species
 
Orders
OrdersOrders
Orders
 
Information of snakes
Information of snakesInformation of snakes
Information of snakes
 

Kürzlich hochgeladen

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 

Kürzlich hochgeladen (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 

Online presentation

Hinweis der Redaktion

  1. In Texas, There are over 100 species of non-venomous, harmless snakes, and only 4 species of venomous snakes. There are multiple ways you can identify a venomous snake, but not all snakes follow these rules. I’ll talk about what those rules are and which snakes break those rules. Then, I’ll talk about the four venomous snakes in texas, because the best way to identify a venomous snake is to know what it looks like.
  2. According to Texas Parks and Wildlife, you are four times more likely to be killed by lightning than a snakebite. Texas has an average of two to three deaths per year from snakebites, compared with eight from lightning. Many times people kill snakes such as the black rat snake or the racer snake, thinking they are copperheads. Which is a shame, because rat snakes and others do no harm and help keep the pest populations down . Besides, most snakes -- even venomous ones -- are not aggressive and would rather avoid people. A snake can only strike to a distance half its body length. So a reasonable distance will keep you safe. Give the snake time to go on its way. If you’re concerned about a venomous snake, call animal control instead of attempting to trap it on your own, particularly since some species, like the timber rattlesnake are on the endangered species list. Q: Are all snakes venomous?A: Two families of venomous snakes are native to the United States. The vast majority are pit vipers, which include rattlesnakes, copperheads and cottonmouths (water moccasins). About 99 percent of the venomous bites in this country are from pit vipers. The other family of domestic venomous snakes is Elapidae, which includes two species of coral snakes 
  3. Most venomous and non venomous snakes have unique body types that you can use to tell the difference. You can identify venomous snakes from their head shape, pupil shape, belly scale shape, and bite mark.
  4. The easiest way to identify a venomous snake is by its head shape. Most venomous snakes have triangular heads to accommodate the venom sacks in their jaws. Unfortunately, many non venomous snakes have triangular heads as well, so you may want to use another method with this one.
  5. Non venomous snakes have circular pupils, like a human, while venomous snakes have elliptical pupils like a cat. Unfortunately, you have to be very close to a snake to use this method, and it doesn’t always work. Texas lyre snakes, Northern cat-eyed snakes and Black-lined snakes all have elliptical pupils, but are harmless, The other exception is the venomous coral snake which has circular pupils.
  6. This method can be used to identify a snake from its shed skin, or if you happen to get a good look at the underside of its tail,. Along the belly, all snakes have a single column of scales, but at the end of the tale, after the anal plate, non venomous snakes have two columns of scales.
  7. This is the least ideal way to identify a snake and unfortunately the most accurate, however, if you have been bitten it does help to know that venomous snakes leave two distinct puncture marks. Non venomous snakes have many tiny teeth, so they leave a different bite mark. Non venomous snakes will make superficial cuts that will look like a horseshoe of tiny scratches. Unlike venomous snakes, most non venomous snakes cannot bite through clothing.
  8. Sometimes snakes break the previous four rules by mimicking others. Still, if a snake does exhibit venomous characteristics, it’s a good idea to stay away.
  9. The milk snake and the eastern kingsnakemimc the venomous coral snakes. Because harmless Texas scarlet snakes, Eastern Kingsnakes, and milk snakes share the red, black, yellow coloration pattern, it is important to notice the order of the colored bands. If the snake has red stripes on top of black, like the above, then it’s non venomous, but if it has red stripes on yellow stripes then it is venomous. A good memory-jogging device to learn is "Red next to black is O.K. for Jack; red next to yellow will kill a fellow." Finally, with scarlet and milk snakes, the bands do not completely encircle the body and the belly scales are uniform in color
  10. Because non venomous snakes tend to mimic the way venomous snakes look, the best way to identify a dangerous venomous snake is to know what lives in your area and to recognize their scale patterns.
  11. While many species of harmless snakes will vibrate their tail, only rattlesnakes have rattles which produce a recognizable "cicada-like" buzz. And while most rattlers will sound their rattles when they sense your presence, this is not always the case. If you catch a rattlesnakes totally by surprise, it may strike first. Luckily, rattlesnakes are easy to recognize for their pattern of yellow-bordered, black diamonds. Feared as deadly and aggressive, diamondbacks are actually highly averse to human contact and only attack in defense.
  12. This is the coral snake. It has circular pupils and a narrow, non triangular head. Coral snakes are the only venomous snake in Texas that is brightly colored. The best way to identify it is through it’s colored bands, and the popular rhyme. Coral snakes are extremely reclusive and generally bite humans only when handled or stepped on. In fact, no deaths from coral snake bites have been reported in the U.S. since an antivenin was released in 1967.They live in the wooded, sandy, and marshy areas of the southeastern United States, and spend most of their lives burrowed underground or in leaf piles. Unlike other venomous snakes in texas, the coral snake produces a neurotoxin. here is little or no pain or swelling at the site of the bite, and other symptoms can be delayed for 12 hours.
  13. You can identify a copperhead by the rust colored patch on its head. Copperhead markings look like a string of rust-colored hourglasses. Young copperheads are easily distinguished by their lemon-yellow tail, which young copperheads will retain for about a year. Young snakes are just as venomous as adults. Remember thatCopperheads are social snakes. They may hibernate in a communal den with other copperheads or other species of snakes including timber rattlesnakes and black rat snakes. They tend to return to the same den year after year. but are believed to migrate late in the spring to reach summer feeding territories and reverse this migration in early autumn.
  14. The cottonmouth is easy to recognize because of its distinct triangular head. The cottonmouth is also called the water moccasin, and is recognized through it’s distinctive white mouth. The back is dark olive or black, the belly is paler. On young animals the back is marked by bands with dark borders and paler centers but this pattern is usually lost in older individuals. The snout is always pale, and there is usually a dark vertical line by each nostril. Cottonmouths are primarily active at night, but they bask in the sun during the day. Cottonmouths have varying temperaments. They are usually not aggressive and will not attack unless agitated.Cottonmouths are semi-aquatic and can be found near water and fields. They inhabit brackish waters and are commonly found in swamps, streams, marshes, and drainage ditches in the southern lowlands of the Unit
  15. Remember, the easiest way to identify a snake is by knowing which snakes are venomous in your area, or look for triangular heads, elliptical pupils, fangs, or one column of scales under the tail.