Question 1: “CPUs and Programming” Please respond to the following: • From the first e-Activity, identify the following CPUs: 1) the CPU that resides on a computer that you own or a computer that you would consider purchasing, and 2) the CPU of one (1) other computer. Compare the instruction sets and clock rates of each CPU. Determine which CPU of the two is faster and why. Conclude whether or not the clock rate by itself makes the CPU faster. Provide a rationale for your response. • From the second e-Activity, examine two (2) benefits of using planning techniques—such as writing program flowcharts, pseudocode, or other available programming planning technique—to devise and design computer programs. Evaluate the effectiveness of your preferred program planning technique, based on its success in the real world. Provide one (1) example of a real-life application of your preferred program planning technique to support your response. Question 2: Research phishing schemes on the web and identify a recent scheme (from the last six months). Summarize the phishing scheme you chose and discuss why it may have been successful. What are the red flags that one should look out for to avoid becoming a victim? What should one do if one encounters such schemes? As a security manager, what actions might you take to assure your company does not fall victim to phishing? Include any training or simulation/white hat hacking you might consider.