Listen closely

Posted on 2013-06-09
Last Modified: 2013-06-10
Listen closely to this video.

I'd like to know how many members in the group participated in the vocals.
Question by:nickg5
  • 3
  • 2
LVL 84

Accepted Solution

ozo earned 300 total points
ID: 39233649
LVL 25

Author Comment

ID: 39234892
How did you arrive at that number?
LVL 22

Assisted Solution

Flyster earned 200 total points
ID: 39236171
If this person making the comment is correct, then I have to agree with Ozo:

Chuck Bush 1 week ago

This "group" is actually the overdubbed voice of¿ Ron Dante of Archies fame!

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

LVL 25

Author Comment

ID: 39236342
You were supposed to listen not do research.
Yes, it's a one man band.
LVL 25

Author Closing Comment

ID: 39236343
LVL 22

Expert Comment

ID: 39236394
Sorry. When I chicked on the link I was not getting it to play. I remember when that song first came out! Never knew it was a solo act. Thanks!

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Small Business mathematics 7 460
When is the right time to sell an option to minimize risk and maximize return? 11 593
Market risk VAR model 1 469
Help with soduko 2 190
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to …
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question