1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
15

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of thei

r software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this
Computers and Technology
1 answer:
soldier1979 [14.2K]3 years ago
4 0

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

You might be interested in
A for loop is most useful for: A. executing some statements for a specific number of iterations B. executing some statements for
dsp73

Answer:

Option A and C

Explanation:

  • Loops are control structures used to rehash a given area of code a specific number of times or until a specific condition is met. Visual Basic has three principle sorts of circles: for..next circles, do circles and keeping in mind that circles.  
  • For loop is a programming language contingent iterative proclamation which is utilized to check for specific conditions and afterward over and over execute a square of code as long as those conditions are met.
4 0
3 years ago
When issued a GFE device, you are required to sign an AUP
pav-90 [236]
GFE stands for Government Furnished Equipment. While AUP is Acceptable Use Policy (AUP). The AUP  should be read and signed by employees annually.  <span><span> </span></span>The statement that "When issued a GFE device, you are required to sign an AUP" is true. 
7 0
3 years ago
Read 2 more answers
You are part of which sphere of Earth?
Elden [556K]
We are on the lithosphere
4 0
3 years ago
Read 2 more answers
Discuss how the user-designer communications gap can cause a good project to go bad.
Mila [183]
This gap between user-designer communications <span>can cause a good project to go bad i</span>f the user is not able to process what is required to be fixed in order for the project to run smoothly. The user may have one way of fixing something while the designer has another. In this case, the designer understands how the project fully works while the user does not and this may end up compromising the whole project.

The law that “designers are not users” and “users are not designers” should always be followed.




3 0
4 years ago
PLEASE ANSWER DUE TODAY
never [62]

Answer:

I am not sure on exactly how they want this but this is how I'd fill it out:

Also I can't see the whole question so I'll fill it out as best as I can.

Explanation:

Employee 1 - 78 hours - $2 an hour - $2,184 -

Employee 2 - Numbers of hours worked - their hourly pay - hours x hourly pay x days worked (if they work everyday for 2 weeks you'd x's it by 14.)

All I see is employee 1 and 78 hours so I tried my best!

Please mark brainliest and 5 stars, thanks!

4 0
3 years ago
Other questions:
  • What is also known as a visual aid in a presentation?
    14·2 answers
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • Sending an email to customer support before looking through the site and reading the frequently asked questions is an example of
    5·1 answer
  • By which method is heat transferred through a metal <br> spoon?
    9·2 answers
  • Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
    14·1 answer
  • How to change the date modified on a word document?
    11·1 answer
  • Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
    9·1 answer
  • What is the purpose of including comments in code?
    15·1 answer
  • Plz show working for binary addition. please solve. 11000 + 110101 + 101011​​
    15·2 answers
  • CISC vs RISC processors might be used, and come up with environments where one processor would outperform the other.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!