Solved

Listen closely

Posted on 2013-06-09
6
373 Views
Last Modified: 2013-06-10
Listen closely to this video.

I'd like to know how many members in the group participated in the vocals.

http://www.youtube.com/watch?v=Dj2Vo8QYny4
The-Cuff-Links---Tracy.flv
0
Comment
Question by:nickg5
  • 3
  • 2
6 Comments
 
LVL 84

Accepted Solution

by:
ozo earned 300 total points
ID: 39233649
One
0
 
LVL 25

Author Comment

by:nickg5
ID: 39234892
How did you arrive at that number?
0
 
LVL 22

Assisted Solution

by:Flyster
Flyster earned 200 total points
ID: 39236171
If this person making the comment is correct, then I have to agree with Ozo:

Chuck Bush 1 week ago

This "group" is actually the overdubbed voice of¿ Ron Dante of Archies fame!

Flyster
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 25

Author Comment

by:nickg5
ID: 39236342
You were supposed to listen not do research.
Yes, it's a one man band.
0
 
LVL 25

Author Closing Comment

by:nickg5
ID: 39236343
-
0
 
LVL 22

Expert Comment

by:Flyster
ID: 39236394
Sorry. When I chicked on the link I was not getting it to play. I remember when that song first came out! Never knew it was a solo act. Thanks!
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Small Business mathematics 7 460
When is the right time to sell an option to minimize risk and maximize return? 11 593
Market risk VAR model 1 469
Help with soduko 2 190
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to …
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question