1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kaheart [24]
3 years ago
14

Why when I send a message on iOS it says the person’s notification is silenced, and the message isn’t delivered?

Computers and Technology
1 answer:
Leto [7]3 years ago
4 0

Answer:

This is because the other person has "Focus Mode" turned on. When this is turned on, all of your messages that you send to him/her will be silenced.

You might be interested in
Frank - as the Scrum Master of a Scrum Team - is invited for a Daily Scrum meeting at 9am. The teamgets together in front of the
Bezzdna [24]

The thing that Frank should do according to the options given is to Wait until the discussion is over.

<h3>What is a Scrum Master do?</h3>

A Scrum master is known to be a person who is said to often leads a team in course of a project through the use of Agile project management techniques.

Note that in the above scenario, Frank should wait until the discussion is over and then give a note of warning to the employee at fault.

See options below

What should Frank do?

A) Wait until the discussion is over.

B) Interrupt the discussion and organize a follow-up meeting directly after the Daily Scrum meeting.

C) Stop the discussion. The team member who started working on this particular task is responsible and he decides what and how to do with this.

All of the above

None of the above

Learn more about Scrum Master from

brainly.com/question/4763588

7 0
2 years ago
A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownershi
lianna [129]

The correct scripts are:

chmod 765 script1

chmod u+x script1

A cοmmand is an instructiοn givеn by a usеr tеlling a cοmputеr tο dο sοmеthing, such a run a singlе prοgram οr a grοup οf linkеd prοgrams. Cοmmands arе gеnеrally issuеd by typing thеm in at thе cοmmand linе (i.е., thе all-tеxt display mοdе) and thеn prеssing thе ЕNTЕR kеy, which passеs thеm tο thе shеll.

In Unix-likе οpеrating systеms, chmοd is thе cοmmand and systеm call which may changе thе accеss pеrmissiοns tο filе systеm οbjеcts. It may alsο altеr spеcial mοdе flags. Thе rеquеst is filtеrеd by thе umask. Thе namе is an abbrеviatiοn οf changе mοdе.

8 0
4 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
A tree can grow on rock as long as its roots can reach soil through cracks in the rock.
ycow [4]
I would say the answer is c
3 0
4 years ago
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
Other questions:
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • In most presentation software, custom animations are added from the _____. Insert menu Normal view Slide pane Task pane
    12·2 answers
  • Hugh is giving an informative speech about U.S. Senate election campaigns. Which thesis statement do you recommend he use?
    8·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • Will there be a season 3 of Gravity Falls?
    5·2 answers
  • With respect to the five components of social media information systems (SMIS), which of the following statements is true of SM
    11·1 answer
  • Give a regular expression for binary numbers. They can be integers or binary fractions. A leading - sign is always allowed. Lead
    15·1 answer
  • Which retouching action is unethical?
    8·1 answer
  • WILL GIVE BRAINLIEST!! 20 PNTS!!
    7·2 answers
  • The capacity of your hand drive is measured in​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!