yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

How a Great White Shark Strikes | Shark Attack Files


2m read
·Nov 11, 2024

In Muscle Bay, South Africa, Allison Towner and Enrico Janari investigate if speed is what makes a great white's jaws so deadly. Other investigators have seen how a bull shark's bite works. Now, getting a bite impression might help them solve the mystery of how a great white combines bite force with thrust.

"The shark just came out of the water, vertical, open mouth, almost like saying, 'Look at me, oh majestic animal, I am!' This is definitely the biggest shot that we've had so far, guys. He gave a big bite and he's still playing around with it for a good two minutes, so we should have got some very nice bite imprint."

They've got their results and they're revealing, "Wow, wow! It didn't just bite; it launched out of the water with its mouth! We couldn't have asked for better teeth impressions! Look at this, this is gold! The deepest bite impressions are most likely from the initial strike. We've got huge amounts of teeth marks there—these being the top teeth of the shark's jaw. And then, on the reverse side here, we can see the lower jaw perfectly. This shark has all of her teeth in place."

"We can only move our bottom jaws for eating; a great white can move both top and bottom! But for a shark capable of decapitating a seal in one bite, the damage to the decoy is surprisingly minimal. Maybe they don't have as much high back forces. Other species could be that the speed alone and the impact of the force of the hit is more powerful than the actual bite force."

"Um, so there's lots of complexity to tease apart. White sharks combine bite force and thrust to attack their prey. Their teeth are long, sometimes close to seven inches. With that many daggers, this shark may not need as much bite force as a bull shark. While the bull shark's teeth act like a buzz saw, a white shark's functions like a guillotine."

"Great white sharks have 24 teeth on the top and 26 on the bottom. You can liken it to a whole series of steak knives in a fish's mouth. The top teeth are the cutters; they are highly serrated and they are basically the teeth that saw into the flesh of their prey. The bottom teeth are very different; they're much more narrow but equally as serrated. So, as the bottom teeth pin and hold the prey, the top teeth cut through the flesh. And those mechanics together make the bite so powerful and so effective."

More Articles

View All
Seth Klarman: The Secret to Outperforming the Market
You need not to be greedy. If you’re greedy and you leverage, you blow up. Almost every financial blow-up is because of leverage. And then you need to balance arrogance and humility, and I’ll explain what I mean. When you buy anything, it’s an arrogant a…
15 Investments Rich People Make The Poor Know Nothing About
Rich people are making bank in ways everyone else isn’t even aware of. If you watch Until the End, you’ll realistically learn more about money in this video than you did in an MBA course. Here are 15 investments rich people make the poor know nothing abou…
Black Hole Star – The Star That Shouldn't Exist
Black hole stars may have been the largest stars that ever existed. They burned brighter than galaxies and were larger than any star today or that could ever exist in the future. But besides their scale, what makes them special and weird is that deep insi…
Approximating dividing by decimals
What we’re going to do in this video is get a little bit of practice estimating dividing with decimals. So, for example, we want to figure out approximately— that’s what these kind of squiggly equal sign means; this means approximately equal. So what is…
Worked example: Predicting whether a precipitate forms by comparing Q and Kₛₚ | Khan Academy
[Instructor] For this problem, our goal is to figure out whether or not a precipitate will form if we mix 0.20 liters of a 4.0 times 10 to the negative third Molar solution of lead two nitrate with 0.80 liters of an 8.0 times 10 to the negative third Mola…
How Quantum Computers Break The Internet... Starting Now
Right now, some nation states and individual actors are intercepting and storing lots of encrypted data like passwords, bank details, and social security numbers. But they can’t open these files. So why are they doing it? Well, because they believe that w…