1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
2 years ago
6

How to turn off do not disturb on iphone for a contact.

Computers and Technology
2 answers:
Lana71 [14]2 years ago
5 0

Answer:

Open Messages App > tap on Conversation of the Contact that you want to Turn OFF Do Not Disturb Mode. On the next screen, tap on the Contact Name or Number and then tap on the “i” (Details) icon. On the next screen, toggle OFF the option for Hide Alerts. Tap on Done to save your settings.

Explanation:

Hope this Helps!

Pls mark me brainliest

Tresset [83]2 years ago
3 0

Answer:

Okay so you turn your phone on scroll up and it well show everything click the moon and on the side of your phone there is alittle swice turn it right

Explanation:

You might be interested in
4.5 Code Practice
Alex787 [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This program is written in C++.

                                                                         

#include <iostream>

using namespace std;

int main()

{

   

   string word;// variable for taking user input

   int cond;// to set condition true if user preses the stop and exit from loop

   

   cout<<"Enter word: \n";

   cin>>word;

   do// start while loop

   {

       

       

       if(word=="stop" || word =="STOP" || word == "Stop")// if user enter word stop, then program exit

       {

       cond=0;

       

       }

       else//otherwise loop continue

       {

           cout<<" You Entered "+ word +"\n";

           cout<<"Enter word: \n";

           cin>>word;

           cond=1;

       }

   }  

   while(cond == 1);// if user don't enter word "stop" loop run continuesly.  

   cout<<"Program exit";

   

   return 0;

}

5 0
3 years ago
How do you view a presentation as your audience would see it?
Nutka1998 [239]
<h3>Answer:</h3>

Option B is the correct answer.

=> By clicking slideshow button.

<h3>Explanation:</h3>

A view in which audience should see the presentation is the SLIDE SHOW VIEW.

Slide show can be started by clicking on the Slide show tab than choose one of the desired option/ways to SET UP SLIDE SHOW.

<h3>I HOPE IT WILL HELP YOU!</h3>
5 0
3 years ago
Read 2 more answers
Three types of neurons and their function
kramer

<u>Efferent Neurons:</u> efferent neurons are motor neurons that carry neural impulses away from the central nervous systme and towards muscles to cause movement.

<u>Interneurons: </u> a neuron which transmits impulses between other neurons, especially as part of a reflex arc

<u>Astrocytes:</u> Astrocytes are the most numerous cell type within the central nervous system (CNS) and perform a variety of tasks, from axon guidance and synaptic support, to the control of the blood brain barrier and blood flow. To perform these roles, there is a great variety of astrocytes.

Explanation:

7 0
3 years ago
PLEASE HELP, THANK YOU SO MUCH!
ozzi

Answer:

The correct answer is "Once a day".

Explanation:

According to social media marketing, it is a good idea to check your reader at least once a day. Readers help business by tracking what the consumers are seeing and what times of the day. Checking the reader at least once a day help people in marketing to be updated, because people's preference keep changing all the time.

3 0
3 years ago
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
3 years ago
Other questions:
  • What is the size of the key space if all 8 characters are randomly chosen 8-bit ascii characters?
    6·1 answer
  • How can public-key encryption be used to distribute a secret key?
    6·1 answer
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • Please help!<br><br> What is a non-iterative programming structure?
    11·1 answer
  • A corporate or government network that uses Internet tools, such as Web browsers, and
    13·1 answer
  • What is the difference between second generation and third generation​
    15·1 answer
  • One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data tra
    8·1 answer
  • I WILL MARK BRAINLEST
    7·1 answer
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
  • Select the correct text in the passage.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!