1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
14

Ask one of your parent, grandparent or elder relatives about the popular song during their time they consider their favorite. As

k them why they like the song. Afterwhich, listen to the song yourself, which wordings or lyrics in that song you find interesting and why?​
Computers and Technology
1 answer:
inysia [295]3 years ago
4 0

Answer:

Babooshka by Kate bush

Explanation:

My dad likes this song because it has a very nice beat

I find this sond interesting because the vocals and pitch end up sounding different than you would expect them to be. Also the range of the singer (Kate bush) is amazing

You might be interested in
Implement switch/case or if/else ladder for menu control. Update the currency conversion program. If the user enters an invalid
Sindrei [870]

Answer:

I need some time i answering your question please follow me and thanks

6 0
3 years ago
PLZZZZZZZZ HURRY What is FireWire?
ycow [4]

Answer:C

Explanation:

7 0
4 years ago
Read 2 more answers
How many pages is 2000 words double spaced 12 font.
Anna007 [38]

Answer: 8 pages

Explanation:

4 0
2 years ago
State the rule of 72 for the number of years to halve.
Nataliya [291]

The "Rule of 72" is a simplified way to determine how long an investment will take to double, given a fixed annual rate of interest. By dividing 72 by the annual rate of return, investors can get a rough estimate of how many years it will take for the initial investment to duplicate itself.

4 0
3 years ago
21. The most overlooked people in information security are:
yulyashka [42]

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

8 0
3 years ago
Other questions:
  • Why must an rodc be able to connect to at least one windows server 2008 or higher domain controller?
    5·1 answer
  • Which is the correct sequence of steps for opening a new document?
    10·2 answers
  • Write a basic program that performs simple file and mathematical operations.
    6·1 answer
  • Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
    13·1 answer
  • Why is it important to study in a quiet well lit area
    5·2 answers
  • Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
    10·1 answer
  • Fill in the blanks in the SQL statement below that will list the invoice number, invoice total and credit which is the total sum
    14·1 answer
  • Personal statements School leaver
    15·1 answer
  • Question of Computer science​
    7·1 answer
  • Alayna is researching information online to write her essay about the Berlin Wall.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!