1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
5

Can someone give me an window blur code in javascript like i mean full coding

Computers and Technology
1 answer:
Gala2k [10]3 years ago
3 0

Answer:

uh wha- what?!?!

Explanation:

no

find it urself

:P

jekqfjewil bored anyways

You might be interested in
Why has the Personal Software Process not been widely adopted by software industry?
professor190 [17]

Answer:

Personal software process is basically refers to the intellectually tough and demanding for a degree of commitment (for example: Prolonged and high priced training needed ) which are not usually feasible to attain.

In additional to the requiring stage of various dimension is culturally tough for various software program practitioners. As, it is not much feasible approach so the personal software processing is not much widely adopted by the various software industries.

5 0
3 years ago
By default, headers and footers apply to
AleksAgata [21]
Hold up I know he answer
6 0
3 years ago
Jaboooo helloooo are u there
Fed [463]
?????????????????????
8 0
3 years ago
Read 2 more answers
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
If you were to go back in time, what games might you find kids playing at the local arcade? List and describe at least two games
Mrac [35]

Answer:

Pac-Man Battle Royale, Space Invaders Frenzy

Explanation: Pac-man Battle Royal, came out in 2011 not that long ago. Space Invaders Frenzy came out in 1978. That came out A WAY long time ago.

6 0
4 years ago
Other questions:
  • Which of the following best describes Vivofit’s purpose?
    9·1 answer
  • Apart from confidential information, what other information does NDA help to outline?
    15·1 answer
  • A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
    9·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also
    11·1 answer
  • Select three nonrenewable types of energy.
    9·1 answer
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • What other jobs would require employees to follow directions very carefully? (Give 4 examples)​
    9·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!