Filed Under:

A's On Either End

Play associated audio

On-air challenge: Every answer is a word that begins and ends with the letter A. You'll be given an anagram of the letters between the A's. For example, given "ern," you would say, "arena."

Last week's challenge: Name something in five letters that's generally pleasant, it's a nice thing to have. Add the letters A and Y, and rearrange the result, keeping the A and Y together as a pair. You'll get the seven-letter word that names an unpleasant version of the five-letter thing. What is it?

Answer: Dream; Daymare

Winner: Susan Lynn of Portland, Ore.

Next week's challenge: Name a familiar form of exercise in two words. Switch the order of the two words. Then say them out loud. The result phonetically will name something to wear. What is it?

Submit Your Answer

If you know the answer to next week's challenge, submit it here. Listeners who submit correct answers win a chance to play the on-air puzzle. Important: Include a phone number where we can reach you Thursday at 3 p.m. Eastern.

Copyright 2014 NPR. To see more, visit http://www.npr.org/.

NPR

In Pakistan, Literary Spring Is Both Renaissance And Resistance

For the past decade Pakistan has faced war, political instability and the rise of religious extremism. But those crises have fueled a new generation of Pakistani writers and artists.
NPR

Behold Ukrainian Easter Art: Incredible, Inedible Eggs

Even 2,000 years ago, people seemed to know that the egg could be a source of life. And an ancient art form has been passed down, transforming a symbolic source of food into a dazzling decoration.
NPR

Is Obamacare A Success? We Might Not Know For A While

Fans and foes want to know whether the Affordable Care Act is meeting its goals. But, for good reasons, there are no clear answers yet.
NPR

Between Heartbleed And Homeland, NSA Treads Cybersecurity Gray Area

Amid controversy over the Heartbleed security bug, the White House clarified how U.S. intelligence agencies must handle such bugs. Bloomberg Businessweek cybersecurity reporter Michael Riley explains.

Leave a Comment

Help keep the conversation civil. Please refer to our Terms of Use and Code of Conduct before posting your comments.