1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
2 years ago
6

How to turn off do not disturb on iphone for a contact.

Computers and Technology
2 answers:
Lana71 [14]2 years ago
5 0

Answer:

Open Messages App > tap on Conversation of the Contact that you want to Turn OFF Do Not Disturb Mode. On the next screen, tap on the Contact Name or Number and then tap on the “i” (Details) icon. On the next screen, toggle OFF the option for Hide Alerts. Tap on Done to save your settings.

Explanation:

Hope this Helps!

Pls mark me brainliest

Tresset [83]2 years ago
3 0

Answer:

Okay so you turn your phone on scroll up and it well show everything click the moon and on the side of your phone there is alittle swice turn it right

Explanation:

You might be interested in
When an entrepreneur has three employees at a busy and growing software company, what is the primary responsibility of the entre
polet [3.4K]

To direct the employees and respond to any calls/emails regarding a problem or upgrade that should be changed/fixed. (I don't know if that's what you wanted)

4 0
3 years ago
Read 2 more answers
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
What learning about computer
uysha [10]

<em>Computer-based learning (CBL) is the term used for any kind of learning with the help of computers. Computer-based learning makes use of the interactive elements of the computer applications and software and the ability to present any type of media to the users.</em>

8 0
3 years ago
50-75 words about what motivates you in academic life and are these motivators different from what motivates you in your persona
drek231 [11]

<u>Answer:</u>

<em>My teachers & My parents are the main reason to get through academics well. </em>

Though the reason might be common to most of the people, <em>the situation might be unique and the way the advice's are comprehended and the process of intake and the actions would be unique to each person.</em>

How a mother gives medicine to a child along with sugar, in a similar way my <em>parents and teachers gave me advice which made me to stand at this top-level.</em>

6 0
3 years ago
When you
k0ka [10]

Answer:

Collaborate.

Explanation:

It was correct for me!

5 0
3 years ago
Other questions:
  • Should I learn Python, C++, C# or VB to start off programming games for Windows. Open to other language recommendations as well!
    6·1 answer
  • In a video, a motionless image is called
    7·2 answers
  • What considerations have to be kept in mind with JPEG
    10·1 answer
  • Which osi layer defines the functions of logical network-wide addressing and routing?
    14·1 answer
  • Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
    6·1 answer
  • Why coaxial cable is called coaxial cable?
    11·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • .Choose the extention of Scratch Project<br><br><br> .sb2<br><br> jpeg<br><br> .exls
    5·2 answers
  • At Greenwood ATCT, arrival information need NOT be forwarded while FDIO is operational unless the sequence of aircraft changes a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!