Discussion replies 1 & 2 Respond to these two students. Each response 150 words. Include 2 sources for each response. 1 biblical and 1 scholarly source. Include links in reference page. Jay: Operating System Components Device management and security are two examples of operating system components. System boundaries must include distinct users and their workstations […]