Permission is granted to copy, distribute and/or modify this document under the terms of theGNU Free Documentation License,Version 1.2 or any later version published by theFree Software Foundation;with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitledGNU Free Documentation License.http:// gnu.org/copyleft/fdl.htmlGFDLGNU Free Documentation Licensetruetrue
to share– to copy, distribute and transmit the work
to remix– to adapt the work
Under the following conditions:
attribution– You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
share alike– If you remix, transform, or build upon the material, you must distribute your contributions under thesame or compatible licenseas the original.
Please help improve this media file by adding it to one or more categories, so it may be associated with related media files (how?), and so that it can be more easily found.
Please notify the uploader with
{{subst:Please link images|File:Domain of Danger Graphic.jpg}} ~~~~
Captions
Prey will seek central positions within a group to reduce their domain of danger