Discussion 1 Search “scholar.google.com” for a company or school that has reported issues, problems, concerns about their backup procedures. Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about off-site storage of backups? ( 250 Words )Discussion2 Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Write a scholarly review of comparing any two or more OS ( 300 Words )Assignments:3 Using a Web Browser, search for information related to preparing an organization against terrorist attacks. Look up information on (a)anthrax or another biological attack (like smallpox), (b)sarin or another toxic gas, (c)low-level radiological contamination attacks. Using a web browser, search for available commercial applications that use various forms of RAID technologies, such as RAID 0 through RAID 5. What is the most common implementation? What is the expensive? ( 300 words )