Solved

Listen closely

Posted on 2013-06-09
6
357 Views
Last Modified: 2013-06-10
Listen closely to this video.

I'd like to know how many members in the group participated in the vocals.

http://www.youtube.com/watch?v=Dj2Vo8QYny4
The-Cuff-Links---Tracy.flv
0
Comment
Question by:nickg5
  • 3
  • 2
6 Comments
 
LVL 84

Accepted Solution

by:
ozo earned 300 total points
ID: 39233649
One
0
 
LVL 25

Author Comment

by:nickg5
ID: 39234892
How did you arrive at that number?
0
 
LVL 22

Assisted Solution

by:Flyster
Flyster earned 200 total points
ID: 39236171
If this person making the comment is correct, then I have to agree with Ozo:

Chuck Bush 1 week ago

This "group" is actually the overdubbed voice of¿ Ron Dante of Archies fame!

Flyster
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 
LVL 25

Author Comment

by:nickg5
ID: 39236342
You were supposed to listen not do research.
Yes, it's a one man band.
0
 
LVL 25

Author Closing Comment

by:nickg5
ID: 39236343
-
0
 
LVL 22

Expert Comment

by:Flyster
ID: 39236394
Sorry. When I chicked on the link I was not getting it to play. I remember when that song first came out! Never knew it was a solo act. Thanks!
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question