Skip to content
Stop the Invasion NC Micro
Module 1: Your Mission
1.1 Your Mission: Stop the Invasion NC
1.2 Meet the Burmese Python NC
1.3 A Complicated Problem NC
Module 2: Creativity
2.1 What is Creativity? NC
2.2 Creativity Challenge NC
2.3 How Do You Use Creativity? NC
Module 3A: Explore Ecosystems
3.1 Invasive Species Vocabulary NC
3.2 What is an Ecosystem? NC
3.3 What Makes an Ecosystem Healthy? NC
3.4 Ecosystem Differences NC
3.5 Everglades Habitat Model NC
We Got This! Check 1
Ecosystems: LS.5.2.1
3.6 Predators and Prey NC
3.7 Producers Consumers NC
3.8 Model Food Web NC
We Got This! Check 2
Food Chains and Webs LS.5.2.2
Module 3B: All About Invasive Species
3.9 Python Impact NC
3.10 Virtual Field Trip to the Everglades NC
3.11 Burmese Pythons: Everglades Invaders NC
3.12 Measuring the Python’s Impact NC
1 of 2
Previous Lesson
Next Quiz

We Got This! Check 2

  1. Stop the Invasion NC Micro
  2. We Got This! Check 2
Lesson Content
Food Chains and Webs LS.5.2.2
Previous Lesson
Back to Course
Next Quiz
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Scroll to Top
Login
Accessing this course requires a login. Please enter your credentials below!

Continue with Google
Lost Your Password?
Register
Don't have an account? Register one!
Register an Account

Continue with Google

Registration confirmation will be emailed to you.