Article writing homework help

Basic Purpose
How do groups function? How does work get done in these groups? How does that work contribute to the definition and accomplishment of the group’s purposes? How does writing affect the processes of work and interaction in these groups? These are a few of the major questions you might answer in the process of composing your final essay for this course. You third essay will be an activity analysis. What that means, basically, is that you will analyze an activity system* (such as a club, a local sports team, a worship group, a local business, etc.) in order to make a major claim or provide a major insight about some aspect of your chosen activity system, preferably in relation to its textual tools. One way to do this is to focus on the use(s) or implications of specific genres of writing or other textual tools in the system (basically, how writing is used in or affects the system). It could also mean that your essay will focus on a problem that exists between components of the system and how the members of that system attempt to solve that problem. Or it might mean that your essay will focus on how values and authority are created, affirmed, or questioned in the system, possibly including how the system’s use of writing demonstrates this process. In any case, your finished essay should analyze and make a claim about your chosen activity system in some focused manner.
*In this unit, you will read Donna Kain and Elizabeth Wardle’s “Activity Theory: An Introduction for the Writing Classroom,” which will define and discuss activity theory, activity systems, and more. This and other readings in the unit should help you to better understand the concepts that inform this project.
In order to complete this project, you will need to first select an activity system to analyze. You should choose a system you are familiar with (preferably one you are or have been involved with). You should be able to communicate with members of your chosen system, and you should also be able to access some of their written/recorded texts. Finally, choose a system that interests you. You will be learning a lot about it (even if you are already a participant in the system), so choose something you would like to study in depth.
You will need to collect a lot of data. To begin with, you will need to outline the components of the system and their interactions with one another using the activity triangle found on page 400 of our textbook (in Kain and Wardle’s article). Please note: Your overview of the system as can be seen in your outline/triangle is only the start of this project. Your final essay should not be an extended description of the components of the activity triangle. It should, instead, focus on some significant insight about how the system’s components inform, interact with, or otherwise affect the system or other components of the system.
Other research you will likely need to perform for this project includes observing members of the system in action (such as shadowing or even participating), conducting interviews with various members of the activity system, and gathering a variety of actual texts produced, read, or otherwise used by members of the system. Your interviews may include questions about the system’s goals, customs, texts, activities, etc.
Next, you will analyze your data. As Wardle and Downs suggest, you should “focus on what is interesting or complicated here. Do community members agree on the motives and purpose of their activities? Do the genres being used effectively facilitate the work of that community? What sorts of values do the genres suggest that the system has? Who has authority in this system? How is that authority affirmed (or questioned) in the genres and activities?” (317). These questions, and others, may help you arrive at a primary claim about the activity performed in your chosen activity system.
The structure you choose for this project will likely be that of a standard academic paper. You will want to include an introduction that provides relevancy for your subject and leads to your primary claim, a body that explains and analyzes your evidence in order to support your primary claim, and a conclusion that provides closure for your exploration of the topic. You will certainly need to cite Kain and Wardle and/or other authors from this unit in your essay.
Project Milestones
You will submit a draft of your project in a minimum of five stages. (You may seek additional guidance from your instructor if you need to.) Those stages, and the corresponding word count expectations, are listed below.

  1. 1st Peer Review Draft (Partial Draft: 1,000 words or more)
  2. 1st Videoconference Draft (Partial Draft: 1,000 words or more)
  3. 2nd Peer Review Draft (Complete Draft: 2,000-2,500 words)
  4. 2nd Videoconference Draft (Complete Draft: 2,000-2,500 words)
  5. Final Draft (Complete Draft: 2,000-2,500 words)

Additional Details
This project is inspired by the assignment “Activity Analysis” on pages 443-45 of Writing About Writing. You may wish to review those pages for additional ideas and strategies for your activity analysis. Note: Wherever these project guidelines contradict what Wardle and Downs have written on those pages, this document takes precedence over the assignment as outlined in Writing About Writing.

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

>Operations Management homework help

Case Study 10.1: Open Communication at 3M Neck et al. Chapter 10


With more than $30 billion in annual sales, and almost 100,000 employees worldwide, 3M produces products from adhesives to medical device parts to car care products. 3M has been a leader in innovation for over a century. Innovation is, after all, its slogan. Consider, though, what allows this company to sustain its pioneering attitude? The answer lies in excellent communication. As it has done with its evolving products, 3M continues to think of new ways to communicate with its employees.
Click for Unit Learning Outcomes


Following a careful review of the assigned course materials for this unit, read Case Study 10.1: Open Communication at 3M in the Neck et al. textbook. The case is in Chapter 10. Then, draft a formal academic composition in which you respond to the questions posed at the end of the reading.
The responses should reflect higher-level cognitive processing (analysis, synthesis, and evaluation). Students should consider the demands made of decision-makers, as their choices can impact stakeholders within the organization and in the external marketplace. No minimum number of references exists for this assignment, but appropriate business (no Investopedia, Wikipedia, etc.) and scholarly sources must be utilized to support the analysis. Opinion is insufficient to demonstrate a graduate-level understanding of the course materials and topics.

Submission Requirements

  • The submission will not exceed three (3) pages in length, excluding the title and references pages.
  • The essay must adhere to the APA writing style and follow conventions of American English grammar and usage
  • The final document should be prepared as a Microsoft Word file, and submitted as an attachment.
  • attachment

  • attachment

  • attachment

  • attachment

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

>Sociology homework help

  • Using APA 7th edition format, write the complete citation for this article, including authors, year of publication, title of the article, name of the journal, volume number of the journal, and page numbers of the article.
  • Who were the participants in the study, how many were there, what was the sex and ethnicity of the participants, and how did the authors find them? Note: This will be in the Methods section.
  • What question did the researchers want to answer? What were the hypotheses?
  • What methods did the researchers use in the study to try to answer their questions? Note: This is found in the Methods section.
  • How did the results answer the researchers’ questions? What were the limitations of the findings? What are the implications of the research findings and what future research do the authors suggest to contribute to this goal? Note: You will find this in the Conclusion section.
  • Did you find the research interesting? What did you learn from it? What more would you like to know?
  • attachment

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

American history homework help

Demonstrate knowledge of these terms:

  • Interface
  • Interaction/interactivity
  • Viewer, viewer engagement
  • Aesthetics

For your one-page analysis:
1. Describe your chose piece in as much detail as possible. Artist, Title, Date, Medium(s) Type of art. (Painting, installation, game, Instagram narrative, social media artwork, Twitter feed action, Virtual Sit-in)
2. Discuss from these three perspectives at least: interface design, interaction/interactivity, & aesthetics. (Hint: the example does not have an “interface” design, as I see it…but we do interact with it (how?) and it does have an aesthetic to it. What?) 

  • Interface design (What is the interface? Is there an interface? If so, what is it? How does it work? If you do not know what an interface is, then please look this word up. (Links to an external site.)
  • Interaction/interactivity – How can viewers interact with this piece– what has the artist intentionally allowed viewers to do?
  • Aesthetics –What is the featured aesthetic? Please be explicit. Talk about ‘style’, but also, does the art reference other works, if so, which? Does the piece remind you of anything? What associations can you make? Can you label its aesthetic?

Analyze this:  “Truth and Beauty” by Moritz Stefaner –
Image of Artwork – Title, artist, date, medium. *if you know these*
Interface design: There is no “interface” for this artwork. It is a pretty standard-approach to an object-sculpture/installation, shown on a podium. If it is a digital photograph then it is just to be viewed and has no other interface.
Interaction with the piece is determined by the viewer having their vision. There does not appear to be a sound component. While it looks as though this may be a completely fabricated image, it is also possible that one could make it and walk around the podium to look at it from all sides. Otherwise, the viewer is asked to read a small sign, in English, and to make associations between the pile of heart-like objects and the eating utensils. (Use analytical tools from Lecture notes on Week 11?) 
Aesthetics – This piece was found using the search term “social media”. Its aesthetics are, arguably, influenced by social media in the sense that it is a pile or accumulation of “eye-candy-like” hearts, which look almost like candy. The smooth, sleek character of the surfaces suggests artificiality, or ‘hyperreal’ aesthetics, especially if one considers the image to be the artwork and that an artist made this “photograph” in photoshop or another program. It speaks to digital fabrication, 3D printing, and the ability to produce small, meaningless, “likeable” or “fun” objects without thinking too much about what they might mean. The intense color adds to this candy-like “likeability” which comments on the mediation of social reality through apps and platforms which garner the user as much “like attention” as possible. It is as if there is a plate of “followers” and now the artist can gorge herself.

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Information Systems homework help

Jiang, C., Song, J., Liu, G., Zheng, L., & Luan, W. (2018). Credit card fraud detection: A novel approach using aggregation strategy and feedback mechanism. IEEE Internet of Things Journal5(5), 3637-3647.
Li, Z., Liu, G., & Jiang, C. (2020). Deep representation learning with full center loss for credit card fraud detection. IEEE Transactions on Computational Social Systems7(2), 569-579.
Tingfei, H., Guangquan, C., & Kuihua, H. (2020). Using Variational Auto Encoding in Credit Card Fraud Detection. IEEE Access8, 149841-149853.
Zheng, L., Liu, G., Yan, C., & Jiang, C. (2018). Transaction fraud detection based on total order relation and behavior diversity. IEEE Transactions on Computational Social Systems5(3), 796-806.
Zhang, Z., Chen, L., Liu, Q., & Wang, P. (2020). A Fraud Detection Method for Low-Frequency Transaction. IEEE Access8, 25210-25220.
Zanetti, M., Jamhour, E., Pellenz, M., Penna, M., Zambenedetti, V., & Chueiri, I. (2017). A tunable fraud detection system for advanced metering infrastructure using short-lived patterns. IEEE Transactions on Smart grid10(1), 830-840.
Huang, D., Mu, D., Yang, L., & Cai, X. (2018). CoDetect: Financial fraud detection with anomaly feature detection. IEEE Access6, 19161-19174.
Omair, B., & Alturki, A. (2020). A Systematic Literature Review of Fraud Detection Metrics in Business Processes. IEEE Access8, 26893-26903.
Zhu, Bing & Yang, Wenchuan & Wang, Huaxuan & Yuan, Yuan. (2018). A hybrid deep learning model for consumer credit scoring. 205-208. 10.1109/ICAIBD.2018.8396195.
Nie, G., Wei, R., Zhang, L., Tian, Y., and Shi, Y., 2011. Credit card churn forecasting by logistic regression and decision tree. Expert Systems with Applications 38, 12, 15273-15285.
Cecotti, Hubert & Rivera, Agustin & Farhadloo, Majid & Villarreal, Miguel. (2020). Grape detection with Convolutional Neural Networks. Expert Systems with Applications. 159. 113588. 10.1016/j.eswa.2020.113588.
Yifei, R. A. O. (2016). Big Data Algorithm Applied to Credit Risk Assessment Model. International Journal of Simulation–Systems, Science & Technology17(42).
Sarigul, Mehmet & Ozyildirim, B.M. & Avci, Mutlu. (2019). Differential convolutional neural network. Neural Networks. 116. 10.1016/j.neunet.2019.04.025.
Zhou, F.-Y & Jin, Linpeng & Dong, Jianfang. (2017). Review of Convolutional Neural Network. Jisuanji Xuebao/Chinese Journal of Computers. 40. 1229-1251. 10.11897/SP.J.1016.2017.01229.
Dawood, E. A. E., Elfakhrany, E., & Maghraby, F. A. (2019). Improve Profiling Bank Customer’s Behavior Using Machine Learning. IEEE Access7, 109320-109327.
Kvamme, Håvard & Sellereite, Nikolai & Aas, Kjersti & Sjursen, Steffen. (2018). Predicting Mortgage Default using Convolutional Neural Networks. Expert Systems with Applications. 102. 10.1016/j.eswa.2018.02.029.
Zhou, X., Zhang, W., & Jiang, Y. (2020). Personal Credit Default Prediction Model Based on Convolution Neural Network. Mathematical Problems in Engineering2020.
Yu, Z. Y., & Zhao, S. F. (2011, December). Bank credit risk management early warning and decision-making based on BP neural networks. In 2011 IEEE International Symposium on IT in Medicine and Education (Vol. 2, pp. 528-532). IEEE.
Cheng, D., Xiang, S., Shang, C., Zhang, Y., Yang, F., & Zhang, L. (2020, April). Spatio-Temporal Attention-Based Neural Network for Credit Card Fraud Detection. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 34, No. 01, pp. 362-369).
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Computer Science homework help


This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.
For this task, take a close look at the interactivity choices:

  1. Start by identifying all the interactive features deployed, listing them under the headers of either data or presentation adjustments
  2. How suitable are the choices and deployment of these interactive features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential interactive features and functions, what would you do differently or additionally?

Assignment Link:

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

>Computer Science homework help

Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.
Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writin
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

>Information Systems homework help

  Topic: Security Policies of Businesses and Implementation issues
Research Paper: Topic Proposal and Outline Instructions
The easiest approach for selecting a topic for your paper might be to review the various subject areas covered in the course readings (i.e., search the bibliographies of the textbooks). Although the chosen topic must relate directly to the general subject area of this course, you are not limited to the concepts, techniques, and technologies specifically covered in this course.
Each Topic Outline must include the following 3 items:
1. A brief (at least 3–4 bullets with 1–2 sentences per bullet) overview of the research topics of your paper – you will need to address these in the actual paper. This will be titled “Research Objectives”.
2. A list of at least 3 questions (in a numbered list) you intend your research to ask and hopefully answer. These must be questions that will require you to draw conclusions from your research. These must not be questions to answer your research objectives. This section will be titled “Questions”
3. At least 3 initial research sources, 1 of which is an academic journal or other peer reviewed source. These should match APA formatting of sources.
Example formats for Topic Outlines (an example, not a template):
Research Objectives
· Briefly describe the overall concept of system integration.
· Discuss the traditional approach of big-bang integration including the major advantages and disadvantages of this approach.
· Discuss the traditional approaches of top-down and bottom-up integration and their major advantages and disadvantages.
· Discuss the traditional approach of mixed integration, combining the desirable advantages from the top-down and bottom-up integration approaches.
1. Why is system integration an important step in the software development process?
2. Why has big-bang integration not survived as a useful testing method?
3. Why have top-down and bottom-up integration not been replaced by more modern methods?
4. Why would you use mixed integration all the time rather than sometimes using top-down and bottom-up integration exclusively?
1. Herath, T. , & Rao, H. (2012). Encouraging information security behaviors in the best organizations: Role of penalties, pressures, and potential effectiveness. Descision Support Systems, 47(2), 154-165.
2. Testing Computer Software, 2nd Edition, by Cem Kaner
3. Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Cambridge, MA: Wiley.
During your research, if any substantial changes to your objective(s) are necessary, or a topic change is required, communicate with your instructor via email.
The Policy Research Paper: Topic Proposal and Outline is due by 11:59 p.m. (ET) on Sunday of Module/Week 2.
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

>Computer Science homework help

BLCN532 Lab 1
Set up your development environment


This course introduces students to blockchain development for enterprise environments. Before you can develop software applications, you need to ensue your development environment is in place. That means you’ll need all the tools and infrastructure installed and configured to support enterprise blockchain software development projects.
In this lab you’ll set up your own Hyperledger Fabric development environment and install the course software from the textbook. When you finish this lab, you’ll have a working development environment and will be ready to start running and modifying blockchain applications.
The instructions in your textbook are for Mac and Linux computers. However, there is no guarantee that your installation of MacOS or Linux is completely compatible with the environment in which the commands from the textbook work properly. For that reason, I STRONGLY SUGGEST that you acquire an Ubuntu 16.04 Virtual Machine (VM) for your labs. Using an Ubuntu 16.04 VM will make the labs far easier to complete.
The instructions in this course’s labs assume that your computer runs the Windows operating system. If you run MacOS or Linux, you can get Vagrant and VirtualBox for those operating systems and follow the gist of the “Initial setup for Windows computers”.

Lab Deliverables:

To complete this lab, you must create a Lab Report file and submit the file in iLearn. The Lab Report file must be a Microsoft Word format (.docx), and have the filename with the following format:
· SECTION is the section number of your current course (2 digits)
· STUDENTID is your student ID number (with leading zeros)
· LASTNAME is your last name, FIRSTNAME is your first name
To get started, create a Microsoft Word document (.docx) with the correct filename for this lab. You’ll be asked to enter text and paste screenshots into the lab report file.
NOTE: All screenshots MUST be readable. Use the Ubuntu Screen Capture utility (see the lab video.) Make sure that you label each screenshot (i.e. Step 2.1.3) and provide screenshots in order. For commands that produce lots of output, I only want to see the last full screen when the command finishes. Provide FULL screenshots, NOT cropped images.

SECTION 1: Initial setup for Windows computers (Chapter 3)

Step 1.1: Install Oracle Virtualbox (Windows, Linux, MacOS)

Oracle Virtualbox is an open source virtualization environment that allows you to run multiple virtual machines and containers on a single personal computer. Virtualbox is free and it is easy to install.
In your favorite web browser, navigate to: and click the “Download Virtualbox” button. Click the “Windows hosts” link to download the main installation executable. You should also click the “All supported platforms” under the “Extension Pack” heading to download extra software support for devices.
After you download the two files, double click each one to run the install procedure.

Step 1.2: Install Vagrant (Windows, Linux, MacOS)

Vagrant is a free virtual environment management utility. It makes the process of starting, stopping, and managing virtual machines easier. In your web browser, navigate to then click the “Download” button, and click the version of the Windows executable you’d like to install. (Most of you should select the “64-bit” version.)
Once you download the install program, double-click the file you just downloaded to install Vagrant.
If you want more information on Vagrant and tips on getting the most out of the software, navigate to: .

Step 1.3: Set up your Vagrant project

After installing all the pre-requisite pieces, you need to set up your Vagrant project. A Vagrant project defines your virtual machine environment and helps you organize your collection of VMs into a group that is easy to manage.
We’ll use the Windows PowerShell as our Windows command prompt environment. PowerShell is a very powerful command line interface that is available on all Windows computers.
To launch PowerShell, click the Windows key, type PowerShell, then click the Windows PowerShell menu entry. The figure below shows a portion of the Windows PowerShell command prompt window.
PowerShell uses your user’s home directory as its starting directory. In my case, C:Usersmicha is my home directory. For the rest of the lab, I’ll refer to this a %HOME%. Your %HOME% will be different.

1.3.1: Remove existing Vagrant projects

Follow these steps ONLY if you already have a previous Vagrant project you want to remove: (Assume the project you want to remove is located in the %HOME%vagrantHyperledger directory.)
If you DO NOT have an existing Vagrant project that you need to remove, skip to section 1.3.2.
1. PS %HOME%vagrantHyperledger> vagrant global-status
Note the id of the listed VM(s). You’ll use this id in the next command, in place of xxxxxxx.
2. PS %HOME%vagrant\Hyperledger> vagrant destroy xxxxxxx
3. PS %HOME%vagrant\Hyperledger> vagrant box remove ubuntu/xenial64

1.3.2: Create a new Vagrant project for Hyperledger

Launch PowerShell and enter the following commands: (Don’t type ‘PS %HOME%>’, that’s just the PowerShell prompt. Just type the characters in bold.)
1. PS %HOME%> mkdir vagrant
2. PS %HOME%> cd vagrant
3. PS %HOME%vagrant> mkdir Hyperledger
4. PS %HOME%vagrant> cd Hyperledger
5. PS %HOME%vagrantHyperledger> vagrant init kelly219design/ubuntu-xenial-16.04-gui-desktop-base
Make sure that you enter the line above as ONE LINE at the PowerShell prompt 
6. Go to the Blackboard site ( and login.
7. Navigate to this course (BLCN532) -> Content for this week, Lab01.
a. Download the Vagrantfile file and copy it to the %HOME%vagrantHyperledger directory. (This will overwrite the Vagrantfile that was already there.)
8. PS %HOME%vagrantHyperledger> vagrant up
NOTE: To stop your VM type vagrant halt in PowerShell

Section 2: Install Pre-requisites (Chapter 3)

Once you have an operating Linux VM, you can start to install the Hyperledger Fabric pre-requisites. In this section you’ll install all the software and configuration pieces necessary to run the class enterprise blockchain application in Hyperledger Fabric.

Step 2.1: Install pre-reqs

2.1.1: Install dev tools

1. If you haven’t started your VM, do the following:
a. Open Windows PowerShell, then navigate to your Hyperledger project directory.
b. PS %HOME%vagrantHyperledger> vagrant up
2. Login to your VM using the username: vagrant and password: vagrant
3. Click “Search your computer” (upper left corner icon), then type terminal.
4. Click on the Terminal icon to launch a terminal with a shell prompt.
You type all the following commands in your Linux VM (at the Terminal command prompt.)
Don’t type the ‘$’ character. That is the prompt character of a regular user to remind you that this is a command you should enter in Linux. When you see a ‘#’ character, that indicates you are in an elevated privilege shell. And the ‘>’ character indicates you’re in PowerShell. Pay attention to the prompt characters – they give you valuable information about your current context.
5. $ sudo apt-get update
6. $ sudo apt-get install libltdl-dev

2.1.2: Install Docker-CE

You can find complete Docker-CE instructions/docs at:
1. $ curl -fsSL | sudo apt-key add –
2. $ sudo add-apt-repository “deb [arch=amd64] $(lsb_release -cs) stable”
Make sure that you enter the line above as ONE LINE in Linux 
3. $ sudo apt-get update
4. $ sudo apt-get install docker-ce docker-ce-cli

2.1.3: Install Docker compose

1. $ sudo curl -L “$(uname -s)-$(uname -m)” -o /usr/local/bin/docker-compose
2. $ sudo chmod +x /usr/local/bin/docker-compose
3. $ docker-compose version
4. $ date
5. Create a screenshot of the results of steps 1 – 4 and paste it into your Lab Report File.

2.1.4: Install business network pre-reqs

1. $ curl -O
2. $ chmod u+x
3. $ ./
4. $ date
5. Create a screenshot of the results of steps 1 – 4 and paste it into your Lab Report File.
>>> Logout (use the gear icon in the upper right corner) and log back in before continuing.

2.1.5: Install GO language

The next step is to install the GO programming language. You’ll use GO to write and modify source code files for the class blockchain application.
1. $ sudo apt-get update
2. $ wget
3. $ tar xvf go1.12.1.linux-amd64.tar.gz
4. $ nano ~/.profile
5. In the nano editor, add the following 2 lines after the last line in the file:
export GOPATH=$HOME/go
export PATH=$PATH:$GOPATH/bin
6. Save your file and exit nano
7. $ source .profile
8. $ go version
9. $ date
10. Create a screenshot of the results of steps 1 – 9 and paste it into your Lab Report File.

Step 2.2: Install source code and set up business network

In this step you download and install the class application source code and set up the business network.

2.2.1: Forking and Cloning the trade-finance-logistics repository

1. In a browser (in Windows) go to:
2. Sign up or log in
3. Click Fork
You type all the following commands in your Linux VM (at the command prompt.)
4. $ cd $GOPATH/src
5. $ git clone
6. $ cd $GOPATH/src
7. $ mkdir -p
8. $ cd
9. $ git clone -b release-1.1
10. $ cd fabric
11. EDIT FILES *****
a. $ nano Makefile
b. Find the line starts with CHAINTOOL_RELEASE (hint: use CTRL W to search)
c. Change the line you just found to this: CHAINTOOL_RELEASE=1.1.3
d. Find the line that starts with CHAINTOOL_URL (hint: use CRTL W to search)
e. Change the line you just found to this: CHAINTOOL_URL ?=$(CHAINTOOL_RELEASE)/fabric-chaintool-$(CHAINTOOL_RELEASE).jar
NOTE: The line above should be on a SINGLE LONG LINE (don’t break up the line into multiple lines)
f. Save the file (hint: use CRTL O to write the file)
g. Exit the nano editor (hint: use CTRL X to exit)
h. $ nano images/javaenv/
i. Find the line that starts with && curl -fsSL
j. Change the line you just found to this: && curl -fsSL$MAVEN_VERSION/apache-maven-$MAVEN_VERSION-bin.tar.gz
NOTE: The line above should be on a SINGLE LONG LINE (don’t break up the line into multiple lines)
k. Save the file (hint: use CRTL O to write the file)
l. Exit the nano editor (hint: use CTRL X to exit)
12. $ make docker
13. $ make configtxgen cryptogen
14. $ git clone
15. $ cd fabric-ca
16. $ make docker
17. $ date
18. Create a screenshot of the results of steps 1 – 17 and paste it into your Lab Report File.

2.2.2: Generate network cryptographic material

1. $ cd $GOPATH/src/trade-finance-logistics/network
2. $ nano ~/.profile
change last line to this (all on 1 line, not 2):
export PATH=$PATH:$GOPATH/bin:$GOPATH/src/$GOPATH/src/
3. Save file and exit nano
4. $ source ~/.profile
5. $ cryptogen generate –config=./crypto-config.yaml
6. $ date
7. Create a screenshot of the results of steps 1 – 6 and paste it into your Lab Report File.

2.2.3: Generate channel artifacts

1. $ cd $GOPATH/src/trade-finance-logistics/network
2. Execute the follow commands OR run the script (AFTER step 9)
3. $ mkdir -p channel-artifacts
4. $ configtxgen -profile FourOrgsTradeOrdererGenesis -outputBlock ./channel-artifacts/genesis.block
5. $ configtxgen -profile FourOrgsTradeChannel -outputCreateChannelTx ./channel-artifacts/channel.tx -channelID tradechannel
6. $ configtxgen -profile FourOrgsTradeChannel -outputAnchorPeersUpdate ./channel-artifacts/ExporterOrgMSPanchors.tx -channelID tradechannel -asOrg ExporterOrgMSP
7. $ configtxgen -profile FourOrgsTradeChannel -outputAnchorPeersUpdate ./channel-artifacts/ImporterOrgMSPanchors.tx -channelID tradechannel -asOrg ImporterOrgMSP
8. $ configtxgen -profile FourOrgsTradeChannel -outputAnchorPeersUpdate ./channel-artifacts/CarrierOrgMSPanchors.tx -channelID tradechannel -asOrg CarrierOrgMSP
9. $ configtxgen -profile FourOrgsTradeChannel -outputAnchorPeersUpdate ./channel-artifacts/RegulatorOrgMSPanchors.tx -channelID tradechannel -asOrg RegulatorOrgMSP
OR (Instead of typing the commands above, the author provides a script to do it all)
1. $ ./ generate -c tradechannel
Troubleshooting help:
· If you encounter problems with your blockchain network in this lab or future labs, the ./ script may help you resolve them. If you are getting errors when trying to launch or interact with your network, try these commands at the Ubuntu command prompt:
./ down # If your network is up and running
./ clean
./ generate -c tradechannel 
./ up

2.2.4: Launch the sample trade network

There are two ways to launch the sample trade network, using the docker-compose command directly, or by using the author-supplied shell script. We’ll use the shell script in most of our activities.
1. $ cd $GOPATH/src/trade-finance-logistics/network
2. $ ./ up
3. $ date
4. Create a screenshot of the results of steps 1 – 3 and paste it into your Lab Report File.

Step 2.3: Verifying your business network

The last step in this lab is to verify that your business network is up and running.
1. Open a new terminal window in your Vagrant Hyperledger VM. Click “Search your computer” (upper left corner icon), then type terminal, then click the Terminal icon.)
2. Enter the following command:
3. $ docker ps -a
4. $ date
5. Create a screenshot of the results of steps 2 – 4 and paste it into your Lab Report File.
6. The first column in the previous output is the “container-ID”. Find the container-ID for the orderer process, and use it for the following command: (Don’t type the “<” or “>” characters)
7. $ docker logs <container-ID>
8. Create a screenshot of the results of step 7 and paste that screenshot into your Lab Report File.

Section 3: Wrapping up

Once you have your network up and running, the only step to complete is to learn how to properly shutdown your business network.
1. Shut down the business network in Linux:
2. $ ./ down
3. Exit from your Linux Terminal command prompt(s) (i.e. close any open Terminal windows.)
4. $ exit
5. In Windows PowerShell, shut down your Hyperledger virtual machine:
9.  PS %HOME%vagrantHyperledger> vagrant halt
10. Create a snapshot (NOT A SCREENSHOT) of your Ubuntu VM in VirtualBox. This allows you to easily restore to this point if you ever need to “undo” subsequent steps and return to a known point.
a. PS %HOME%vagrantHyperledger> vagrant snapshot EndOfLab01
You should have 8 screenshots in your Lab Report File. Save your file and submit it in iLearn as a file attachment for the Lab 1 assignment.
Congratulations! You have complete lab 1.

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

>Sociology homework help

Getting Started
The cycle of poverty has been described as a phenomenon where poor families become trapped in poverty for generations. Because they have no or limited access to critical resources, such as education and financial services, subsequent generations are also impoverished. How we can break this cycle of poverty? In most cases, the cycle of poverty is systemic in nature, meaning action needs to be taken to combat the root causes of poverty. Through leadership in the policy arena, social workers can assist in the development and implementation of policy to advance human rights as well as social, economic, and environmental justice for disenfranchised populations.
Upon successful completion of this discussion, you will be able to:
Analyze policies with regard to advancement of human rights and social, economic, and environmental justice. (PO 5, ILO 5)
Demonstrate character, scholarship, and leadership in becoming a world changer through application to personal life and professional social work practice.
Demonstrate Christ-like attitudes, values, worldviews, and ethical and professional behavior within advanced clinical practice. (ILO 1)
Video: Breaking the Cycle of Poverty
Video Link:
Background Information
Poverty is the root of many problems and can seem impossible to fight. In this assignment, you will watch a video about activists and individuals fighting poverty in West Virginia. The video highlights ways those in the social services profession can engage in the plight of others.
Review the rubric to make sure you understand the criteria for earning your grade.
Watch the 35-minute video, Segments 1–9, “Breaking the Cycle of Poverty,”. Transcript is available on the video site. (If you are not already logged in to the Off-Campus Library Services (OCLS) website, you will be prompted to enter your MyIWU login and password.)
For the first question of this discussion please identify what policy you will be analyzing during this course.
Navigate to the threaded discussion and respond to three of the following question sets:
What insights did the video give you into poverty in the United States? Were you aware of the economic, social, and educational challenges in communities across the country? What information surprised you the most?
In the video, Nicholas Kristof refers to the “invisibility” of poverty in this country. Do you agree that poverty is an invisible issue in the United States? When you encounter reporting about poverty, how are the stories told? Who are the subjects? What parts of the world are featured? Do you see poverty in your community? If so, what does it look like?
In the video, Truffles did not discover that her son Johnny was nearly deaf until he was 18 months old. Why do you think his condition went unnoticed for so long? What factors do you think cause children in poor communities to be at greater risk for health problems?
Evidence suggests that home visitation programs help improve early childhood development. What other changes need to happen at the policy level to ensure that the most vulnerable children in our society don’t slip through the cracks?
In this country, how aware do you think most people are of the issues presented in the film? Why do you think people may not be more aware? What can be done to raise the profile of these issues?
Which story or issue resonated most deeply with you? Why?
What actions do you think you can take as an individual or as a group to make a difference in addressing one or more of the issues in the video?
Sometimes we see something that moves us and we are momentarily inspired to act. Often, though, that momentum gives way as we move back into thinking about our daily lives. What can we do to maintain awareness of our wider world and particularly the inspiration we feel to make a difference?
Your initial post is due by the end of the fourth day of the workshop.
Read and respond to at least two of your classmates’ postings, as well as all instructor follow-up questions directed to you, by the end of the workshop.
Your postings also should:
Be well developed by providing clear answers with evidence of critical thinking by providing evidence from workshop resources to support responses (with APA citation).
Add greater depth to the discussion by introducing new ideas.
Provide clarification to classmates’ questions and provide insight into the discussion.
Be posted on two different days during the workshop.
Review the rubric that your instructor will use to evaluate your work. Self-assess your initial post and response using the rubric and make improvements as needed to meet expectations and ensure that your work fulfills all the requirements

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"