1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
13

You are reviewing the available updates for clients in Microsoft Intune, and have discovered a large number of updates are avail

able. What is the most efficient way to approve the updates for install?
Computers and Technology
1 answer:
Mama L [17]3 years ago
7 0

Answer:

Enable automatic update rules for specific categories relevant to the downstream devices.

Explanation:

The most efficient way to approve the installation for a large number of updates is to enable automatic update rules for specific categories relevant to the downstream devices.

You might be interested in
PLEASE ANSWER
Andrej [43]

Answer:

uhhhhhhhhhhhhhhhhhhhhhhhhhhhhh

7 0
3 years ago
¿Cuál es el objetivo principal de los servicios?
sleet_krkn [62]
Ayudar a las personas que los contratan
8 0
3 years ago
Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devi
Masja [62]

Answer:

Z-Wave

Explanation:

Z-WAVE can be seen as a protocol which enables home automation and home security to take place because with home automation home appliances as well as lighting , sound systems among others can be smoothly control and monitor.

Secondly Z-WAVE make uses of mesh network, allow appliances to smoothly and successful communicate with each other.

Lastly Z-WAVE which is a wireless protocols make use of data transfer rate that is low.

Therefore Z-WAVE is important because it enables wireless monitoring of home appliances to take place in a smart home.

4 0
3 years ago
Is orange named after the fruit or of the color?
Alexeev081 [22]
I slick thinks it’s because of its color
4 0
3 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
Other questions:
  • Is anyone familiar in drawing flow charts for c++ programming
    14·1 answer
  • In order to achieve a win-win solution, all parties involved should negotiate a solution. True or False ?
    13·2 answers
  • Explain how being a metal, metalloid, or non-metal affects conductivity
    10·1 answer
  • What's a good app that solves trigonometry problems?
    8·1 answer
  • 3. The term integration refers to the ability to
    6·1 answer
  • The type of database that is connected by a company's local area networks is a(n:
    11·1 answer
  • How would you define the rule of thirds?
    11·1 answer
  • Select the correct answer.
    6·2 answers
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • 10. List three adaptations of wind-pollinated plants to promote pollination.<br>​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!