Suppose you are implementing an Ada compiler, and must support arithmetic on 32-bit fixed-point binary numbers with a programmer-specified number of fractional bits. Describe the code you would need to generate to add, subtract, multiply, or divide two fixedpoint numbers. You should assume that the hardware provides arithmetic instructions only for integers and IEEE floating-point. You may assume that the integer instructions preserve full precision; in particular, integer multiplication produces a 64-bit result. Your description should be general enough to deal with operands and results that have different numbers of fractional bits.

Answers

Answer 1

Arithmetic operations for fixed-point binary numbers with a programmer-specified number of b in an Ada compiler can be implemented by multiplication.

Multiplication:

Multiply the two operands as integers. Since integer multiplication produces a 64-bit result, full precision will be preserved.Determine the total number of fractional bits in the result by adding the number of fractional bits in both operands (A and B).Shift the 64-bit result to the right by the total number of fractional bits to get the final fixed-point result. If the result should have a different number of b, shift the result accordingly.

By following these steps, you can implement arithmetic operations for 32-bit fixed-point binary numbers with a programmer-specified number of b in an Ada compiler using only integer and IEEE floating-point b instructions.

Learn more about arithmetic operations at https://brainly.com/question/30553381

#SPJ11


Related Questions


Anna wants to modify the table her partner created in their shared word-processing document. She wants the whole table to have a light blue background.
Which option would allow Anna to make the modification?


Answers

Following are the steps to want the whole table on a light blue background:

1)First select the entire table with the help of the mouse

2)Go to the design which is next to the insert option

3)Select the "Shading" which almost looks similar to the fill color icon

4)Choose the color -light blue

How you can colour in ms word?

It's very simple in MSword, the whole table color into light blue can be changed the borders can also be changed and the thickness can also be selected accordingly. As we know coloring is the most favorite part of everyone following the above simple steps can help you in changing the background of a table.

To know more about Coloring in ms word please follow the link below:

https://brainly.com/question/18992501

#SPJ1

Answer:

its table properties / table tools format

Explanation:

i did the quiz on k12

(CERCLA) If you are named as a prp in a CERCLA case, what are the three defenses you might present to absolve you of liability? (short answer and ref)
A
Question 12 (EPCRA) Where is it mandated that the public must have access to emergency response plans, MSDSs, inventory forms, and followup emergency notices? (ref only)

Answers

A Potentially Responsible Party (PRP) is any individual, company, or entity that is either directly or indirectly responsible for generating, transporting, or disposing of hazardous substances on a Superfund site or in the surrounding areas. To absolve oneself of responsibility, three defenses may be presented by the PRP.

These are: Innocent Landowner Defense - An Innocent Landowner Defense exists for individuals who bought property and were unaware of the contamination before buying it. This defense may help an individual avoid being named as a PRP in a CERCLA case if the contamination occurred before the property was acquired, and the owner was unaware of it when purchasing the property.Bona Fide Prospective Purchaser Defense - A Bona Fide Prospective Purchaser Defense may be used by companies and individuals who bought a property knowing about the pollution but did not contribute to the contamination

. This defense applies to businesses and people who acquire ownership after the site is listed on the National Priorities List, and they take reasonable steps to ensure that they do not contribute to the pollution.Innocent Landowner Defense - This defense is available to persons who have conducted all appropriate inquiry into the previous ownership and use of a property, and to the best of their knowledge, there was no contamination when the property was purchased.

To know more about site visit:

https://brainly.com/question/12913877

#SPJ11

what features allows the user to insert individual names in a primary document​

Answers

I believe its copying, pasting, moving and deleting text within a document. Formatting text such as font type, bolding, underlining or italicizing.

A small department at a company manages a server, separate from IT, for data access and backup purposes. What role does the department fulfill

Answers

The role which is being fulfilled by this department is called data custodian.

What is a database?

A database refers to an organized (structured) collection of data that are stored on a computer system as a backup and are usually accessed electronically.

In Data governance, the responsibilities with respect to data management are divided between information technology (IT) departments and the main business process owners.

What is data custodian?

Data custodian can be defined as a sub-member of the data governance team that is saddled with the responsibility of maintaining data on the information technology (IT) infrastructure of a company such as:

Managing a server.Maintaining data access.Managing backup processes.

Read more on data here: https://brainly.com/question/13179611

Make a list of symptoms of computer virus and preventive measures from computer virus.​

Answers

Answer:

Intrusive pop-ups. Slow performance. Frequent crashes. Unknown login items. Storage space shortage. Missing files.

Explanation:

those are symptoms

How do I delete my brainly account?

Answers

Go to profile in the bottom right then go to profile again and it should be there

Go to profile(edit profile). Then, click preferences. On the bottom, it will say, I want to delete my account.

Why should you create folders when saving files?

Answers

Answer:

it keeps your work organised

Explanation:

Answer:

You can create folders to store and organize your pictures , your videos and soon . Folders are also used to separate the files created by diffrent users.

when the system file checker utility restores a corrupted windows file, where does it get the uncorrupted version from?

Answers

Even though a file looks to be corrupted sometimes, it can still be opened on another computer. This suggests that there may be a problem with the system itself.

How does the System File Checker utility function? What is it?

Windows has a tool called System File Checker that looks for issues with files on your system. Follow these steps to run it: Restart your computer after making sure the most recent Windows updates are installed. Update Windows for additional information.

How can you determine whether a file is corrupt?

Run the "chkdsk" utility on the impacted drives if you suspect file corruption, adding the "/F /R" options after the "chkdsk" as explained in the "Resources" section. Retrieve the lost files from backup copies once "chkdsk" has been performed and the hard disk has been scanned for viruses.

To know more about corrupted windows file visit:-

https://brainly.com/question/29759023

#SPJ4

Please show work with excel formulas
Esfandairi Enterprises is considering a new three-year expansion project that requires an initial fixed asset investment of \( \$ 2.18 \) million. The fixed asset will be depreciated straightline to z

Answers

The annual straight-line depreciation expense for the fixed asset is $726,667.

To calculate the annual straight-line depreciation expense, we need to divide the initial fixed asset investment by the useful life of the asset. In this case, the initial fixed asset investment is $2.18 million and the project's duration is three years.

Using the straight-line depreciation method, the annual depreciation expense is determined by dividing the initial investment by the useful life:

Depreciation Expense = Initial Investment / Useful Life

Depreciation Expense = $2,180,000 / 3

Depreciation Expense = $726,667

This means that Esfandairi Enterprises can expect an annual depreciation expense of $726,667 for the three-year duration of the project.

Learn more about fixed asset

brainly.com/question/14392032

#SPJ11

Ariana has decided to allow some of her co-workers to use the personal photographs
that she took for their business website. Before doing this, however, what does she
need to obtain to grant them permission?
A. a sticker

B. the property value

C. watermark

D. a license

Answers

Answer: D. a license

Ariana needs a license in order to obtain to grant them permission. Thus, the correct option for this question is D.

What are Business websites?

Business websites may be defined as a space that significantly provides general information about the company or a direct platform for e-commerce.

It involves the collection of World Wide Web pages usually containing links to each other and made available online by an individual, company, or organization.

Before deciding to allow some of her co-workers to use their personal photographs, Ariana needs to obtain to grant them permission in the form of a license. This is because it captures the personal identity of co-workers.

Therefore, Ariana needs a license in order to obtain to grant them permission. Thus, the correct option for this question is D.

To learn more about Business websites, refer to the link:

https://brainly.com/question/23060064

#SPJ2

Generally speaking, which of the following sequences best reflects the size of various files, from smallest to largest? text, picture, music, video text, picture, music, video music, text, picture, video music, text, picture, video picture, text, video, music picture, text, video, music text, picture, video, music

Answers

Generally speaking, the sequences best reflects the size of various files, from smallest to largest is: A. text, picture, music, video.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

Also, organization simply refers to the order of arrangement of files and folders by an end user on a computer system.

What is a file size?

In Computer technology, a file size can be defined as a measure of the amount of space (memory) that is taken up by a file on a data storage device.

Generally speaking, the sequences best reflects the size of various files, from smallest to largest is:

TextPictureMusicVideo

Read more on files here: brainly.com/question/6963153

#SPJ1

a company is purchasing new laptops for their graphic artist division. which of the following display technologies provides better contrast and deeper blacks, resulting in better picture quality?

Answers

If a company is purchasing new laptops for their graphic artist division, the display technology that provides better contrast and deeper blacks, resulting in better picture quality is the OLED technology.

OLED technology is an advanced display technology that produces stunningly vivid colors and deep blacks. It is similar to LCD technology, but it does not require a backlight to operate. Instead, each pixel in an OLED display emits its own light. As a result, OLED displays can produce perfect blacks by turning off individual pixels. This leads to higher contrast ratios and more vibrant images.

An OLED display consists of a thin layer of organic material sandwiched between two electrodes. When an electrical current is applied to the electrodes, the organic material emits light. OLED technology is used in high-end smartphones, televisions, and other consumer electronics.

More on OLED technology: https://brainly.com/question/14357424

#SPJ11

In which of the following ways are copyrights different from trademarks?

O It is not necessary to do anything to obtain a trademark, but a copyright must be approved.

O It is not necessary to do anything to obtain a copyright, but a trademark must be approved.

O Trademarked materials can be used under fair use laws, while copyrighted materials cannot.

OCopyrighted materials can be used under fair use laws, while trademarked materials cannot.

Answers

I believe it is C.) Trademarked materials can be used under fair use laws, while copyrighted materials cannot

how many 2/8 pound patties can she make from 7/8 of a pound of hamburger

Answers

Answer:

3/8

Explanation:

Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist

how to stop verification required when installing free apps

Answers

Whether your App Store keeps asking for a password or wants to know how to download apps without a password on iPhone, don’t leave the article until the end of the line to know the App Store and iPhone basics.

How to stop verification required when installing free apps?

Go to Settings > iTunes & App Store > Apple ID and check your payment information is current. Even if you only want something that is free this will be required if you have any payment form on record.

Payment methods that you can use in the iTunes Store, App Store, and iBooks Store - https://support.apple.com/HT202631 (Discussions on this forum mention some countries do not accept debit cards, and even if they do some items cannot be purchased with debit cards.)

if your payment method is declined, or you have a billing issue with a previous purchase in the iTunes Store - https://support.apple.com/HT203005 - various reasons why payment method is declined.

If this abruptly started happening try removing and re-entering your payment information - Change or remove your Apple ID payment information - https://support.apple.com/HT201266

See the end of the document linked above for special measures that may be necessary for some cards, plus about contacting your financial institution to make sure your records match.

To learn more about stop verification refers to;

https://brainly.com/question/28561733

#SPJ1

all network switches require substantial configuration before they can be put into operation in a network. true false

Answers

The statement "All network switches require substantial configuration before they can be put into operation in a network" is partially true. However, a long answer would be required to explain why. Here's why:Explanation:Most network switches require some configuration before they can be used in a network.

There are, however, several unmanaged switches available on the market that do not require configuration, making it simple to add them to a network quickly. Furthermore, several switches are now designed to be simple to set up and operate with no technical knowledge required. On the other hand, many network switches are quite complicated and will require considerable configuration to function properly.

They can have dozens of ports and advanced features such as VLAN tagging and port mirroring, and setting up these features can take some time and expertise. Some switches come with pre-installed templates, making it easier for switches require some degree of configuration, there are exceptions to this rule, and the amount of configuration required varies depending on the type of switch.

To know more about configuration visit:

brainly.com/question/32886519

#SPJ11

WILL GIVE BRAINLIEST!!!!!!!!

WILL GIVE BRAINLIEST!!!!!!!!

Answers

Answer:

camera

Explanation:

they used a camaera so technology inspired

the python language uses a compiler which is a program that both translates and executes the instructions in a high-level language. True/False ?

Answers

True. Python employs a compiler to turn the source code into executable instructions that the interpreter may use.

Python is an interpreted language, which means that the source code is routed through a compiler before being directly translated into machine-readable instructions. The compiler is a piece of software that interprets the instructions in the source code and converts them into something the computer can comprehend. Compiling is the process of translation. Following compilation of the source code, the interpreter takes control and runs the commands. An interpreter is a program that reads the source code's directives and converts them into machine-readable instructions. Due to the fact that the source code does not have to be recompiled each time a change is made, this technique enables the rapid creation of apps. Additionally, the language's ability to be translated

Learn more about Python here

https://brainly.com/question/30427047

#SPJ4

An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems analysts. E. sending data.

Answers

Answer:

C. receiving data.

Explanation:

An information system interacts with its environment by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Hence, the information system relies on the data it receives from its environment, processes this data into formats that are usable by the end users.

a program can exhibit both spatial and temporal locality. T/F

Answers

True, a program can exhibit both spatial and temporal locality.

Yes, a program can exhibit both spatial and temporal locality. spatial locality refers to the tendency of a program to access data that is close to the data it has recently accessed. This means that if a program accesses a particular memory location, it is likely to access nearby memory locations in the near future. Temporal locality, on the other hand, refers to the tendency of a program to access the same data multiple times over a short period of time. This means that if a program accesses a particular memory location, it is likely to access the same location again in the near future.

Both spatial and temporal locality are important for optimizing memory access and improving program performance. By taking advantage of spatial and temporal locality, programs can reduce the number of memory accesses and make better use of the CPU cache, which can significantly improve overall performance.

Learn more:

About program here:

https://brainly.com/question/14368396

#SPJ11

It is true that a program can exhibit both spatial and temporal locality. The efficient utilization of memory resources and the reduction of memory latency are aided by the principle of locality.

A program can exhibit both spatial and temporal locality.What is locality in computer science?In computer science, locality refers to the tendency of computers to access data that is near to recently accessed data. Locality occurs both spatially and temporally. The spatial locality refers to the access of data elements that are near the data accessed previously, whereas temporal locality refers to the access of data elements that have recently been accessed. The concept of locality is important in computer systems because it aids in the reduction of memory latency and the efficient utilization of memory resources.

The principle of locality is critical for a computer program's performance, which refers to the idea that a program would likely access memory locations that are near to those it has already accessed. When a computer program uses the principle of locality, it implies that it will reference memory areas close to previously accessed memory locations.What is spatial locality?Spatial locality is the tendency of a computer program to access data elements that are near to the ones it has already accessed. Spatial locality occurs when a computer program references memory locations that are close to the data that was accessed previously.What is temporal locality?

Temporal locality is the tendency of a computer program to access data elements that have recently been accessed. Temporal locality occurs when a computer program references memory locations that were accessed recently.Conclusion:Therefore, it is true that a program can exhibit both spatial and temporal locality. The efficient utilization of memory resources and the reduction of memory latency are aided by the principle of locality.

Learn more about Temporal locality here,https://brainly.com/question/30036111

#SPJ11

for security, you should always be saving an extra copy of your captured image files to either an external backup drive or to a location on the cloud. true false

Answers

True. It is important to always back up your captured image files in case your computer crashes, is lost, or is otherwise compromised. Backing up to an external drive and/or the cloud will ensure that you will still have access to your images if something unexpected happens.

What is computer crashes?

Computer crashes are a common problem for computer users. A computer crash is when a computer suddenly stops functioning and cannot be used. It can be caused by a number of different things, such as a virus, hardware failure, or software corruption. The most common cause of computer crashes is software-related, usually due to a program that has become corrupted or is incompatible with the operating system. Hardware-related causes of computer crashes include a failing hard drive, overheating system, or faulty RAM. In some cases, a computer crash can be caused by a power surge, or sudden loss of power.

To learn more about computer crashes
https://brainly.com/question/28721296
#SPJ4

Answer:

A. True✓

Explanation:

... jus A. True ✓

a) In order to do this, Miss Kings needs to know how to look up a particular function in Word Help. What is the term for the duplicate image of the contents of Miss King's computer screen that she will capture for inclusion in the report?

Answers

The term for the duplicate image of the contents of Miss King's computer screen is a "screenshot."

A screenshot is a digital image that captures the contents of a computer screen at a specific moment. It is a convenient way to capture and save what is currently displayed on the screen, including text, images, and any other visual elements. Screenshots are commonly used for various purposes, such as documenting computer issues, sharing information, providing visual instructions, or including visual evidence in reports.

To capture a screenshot, Miss King can use built-in functions or third-party software that allows her to capture the entire screen or a specific portion of it. Once the screenshot is taken, she can save it as an image file (e.g., PNG, JPEG) and include it in her report to provide visual context or reference to specific information displayed on her computer screen. The ability to take and include screenshots is a valuable skill for effectively documenting and communicating information in digital form.

To learn more about software click here:

brainly.com/question/32393976

#SPJ11

In which number system do the digital computer work​

Answers

The numbers that are operated on by a digital computer is known as the binary number system; binary digits, or bits. These are 0's and 1's.

Isabela wants to add an image to her presentation. Which tab should she use?

Design
File
Home
Insert

Answers

Answer:

I believe its insert

Explanation:

because when u insert an image ur adding it

Answer:

d

Explanation:

A website you can visit
online is an example
of?

Answers

Answer:

A website you can visit online is an example of a digital media.

Explanation:

how many gigabytes are in a terabyte

Answers

Gigabytes are smaller than terabytes. A megabyte is comparable to 1,024 kilobytes, while a terabyte is 1,024 gigabytes (GB), which are themselves equal to 1,024 megabytes (MB).

For future computers, a hella byte (BB) is a unit of measurement. 1000 yottabytes (YB), or one octillion bytes, are included in one hella byte. One geop byte is equal to 1000 hella bytes. A hella byte is so big that it would require around a trillion supercomputers to store it. One quintillion bytes, one billion gigabytes, or one million terabytes are all equal to one exabyte (TB). In relation to other digital data and storage units: One byte consists of 8 bits. A kilobyte is made up of 1,024 bytes (KB)

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

You want to create a new user account on a Windows system that can create and edit private files, start and stop the system, install applications, and add new device drivers. Which group should this user be a member of?

Answers

To have access to functions like creating and editing private files, starting and halting the system, installing programmes, and adding new device drivers, the user must belong to the "Administrators" group.

Users who belong to the "Administrators" group in Windows have full access to the system's resources, including the ability to install programmes, modify system settings, and control user accounts. Members of this group have complete control over the system and are able to carry out functions that are inaccessible to regular users, such as managing device drivers, editing system files and registry keys, and reading system logs. Due to the increased risk of security breaches and system faults brought on by granting too many users this level of access, it is advised to keep the number of users who belong to this group to a minimum.

learn more about private files here:

https://brainly.com/question/4901683

#SPJ11

When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?

Answers

Answer:

No, there will be values you cannot create, such as values smaller than your smallest bit place value, or values that are "in-between" other values. This inability to represent numbers exactly results in roundoff errors.

Explanation:

Answer:

Yes, we can create the possible fractions using bits to represent the fractions of a number.

Explanation:

A bit is defined as a single digit in the binary code. It is the basic unit of information in digital communication and computing. It has values either 0 or 1.

In the context, we can create the fractions by using the first bits in order to represent the full number and also the last for the bits as the numbers that is above the fraction.

Learn More :

https://brainly.com/question/17386539

When using bits to represent fractions of a number, can you create all possible fractions? Why or why

True or False, social media and mobile phone use are decreasing expectations for corporate ethics and customer service.

Answers

False. While social media and mobile phone use can create more avenues for customers to express dissatisfaction with a company's services, it can also create more opportunities for companies to demonstrate excellence in customer service, ethics, and transparency.

What is company's services?

Our company provides a wide range of services to help businesses succeed. We specialize in web development, digital marketing, search engine optimization, content writing, and more. We take pride in providing high-quality and highly efficient services that are tailored to each client’s individual needs.

Companies that leverage these tools to build relationships with customers and address any issues that may arise can actually increase customer satisfaction and expectations.


To learn more about company's services
https://brainly.com/question/30362491
#SPJ4

explain the basic operations of a computer system​

Answers

Answer:

OPERATING ON INSTRUCTIONS GIVEN AND HOW IT IS GIVEN

Other Questions
Understanding, tolerance and respect are all ways we can reducea)conflictb)reconciliationc)group cohesiond)social interaction SummaryBesides what you've explored in this lesson, what can you try to discover when you compare ideas acrosstexts? Luca coria 4 millas cada maana antes de ir a trabajar. no trabaja los domingos cuntas millas corria Luca en una semana?A.7B.12C.24D.28 A block glass of mass 187.5g is 5cm long t 2cm thick and 75cm high. calculate the density of the in kg/cm^3 Please help fast please ASAP What is the biggest and longest book series ever to exist? A long tube is partially filled with water. The wind blows across the opening, which creates a sound corresponding to the resonance frequency of the partially filled tube. Explain what happens to the resonance frequency if the tube springs a leak. When building a house, the number of days required to build varies inversely withwith the number of workers. One house was built in 72 days by 10 workers. Howmany days would it take to build a similar house with 20 workers? Why was the time period after the fall of Rome called the Dark Ages? (mark all that are true) 1. Famine and disease were widespread.2. There was extreme poverty throughout Europe.3. The government was organized and led by powerful rulers.4. There were few new ideas and cultural contributions. How did Hitler promote Naziism in Germany? please help please help please im giving so much A-100 kVA, single-phase transformer has 80 turns on the primary and 400 turns on the secondary with iron loss of1600W. The primary and secondary resistances are0.01and0.3respectively and the corresponding primary and secondary leakage reactances are0.035and1.1respectively. The primary is connected to supply voltage480V. (i) Calculate the total equivalent impedance as referred to the high voltage side. (ii) Calculate the maximum efficiency at0.8power factor. (b) A 3-phase, 50-Hz, 6-pole induction motor gives an output power33.4kWat955rpm. The frictional and windage losses are1.492kWand stator losses amount to1.5kW. Calculate the efficiency of the motor. .Which of the following is NOT a direction of carbon flux in Earth's carbon cycle?a. ocean to atmosphereb.atmosphere to oceanc.ocean to lithosphered.all are carbon flux directions Which answer choice is it?A 6.88B 11C 3.24D 55 which of the follwoing factors contributed to the rise of the middle class during the industrial revoultion Pinnacle Manufacturing has $1,300,000 in assets and $1,000,000 of equity. What is their total amount of liabilities? $2,000,000 $300,000 $2,300,000 $-300,000 benefits derived from implementing e-procurement systems include all of the following except: group of answer choices allows buyers to submit bids and suppliers to respond to those bids in real time increases the accuracy in communication between buyers and suppliers creates numerous additional job opportunities in the purchasing department allows buyers to support minority or locally owned businesses by storing this supplier information a ventilator-dependent patient is being ventilated with a bag-valve mask as he is transported to the hospital. which finding is the best indication that the patient is being adequately ventilated during transport? Which function has the same domain as y= 2 sqrtx Imagine that your local library has invited community members to submit proposals for a fundraiser. You are the student representativeon the committee to choose the best proposal. Read the two proposals, paying close attention to their similarities and differences.Consider whether or not each proposal is logistically feasible, which fundraiser will most appeal to members of your community, andwhich fundraiser will likely raise more money.Which proposal do you think the committee should choose? Write an essay in which you make a case for your choice. Support yourargument with references to specific details in each proposal.Proposal 1: The best way to get people invested in the library is to show them the joy of reading. For that reason, the library should holda book sale. People could donate books that they no longer want, and the librarians could find books that the library no longer needsVolunteers would need to sort the books into categories and arrange them in an inviting way, like at a bookstore. Books should beinexpensive so people will buy more of them - maybe fifty cents for paperbacks and two dollars for hardcover books. A book sale wouldappeal to people of all ages, from little kids to older people. There should also be a table where people can sign up for library cards. Thatway, if visitors do not find any books they want at the sale they can come back to the libraryProposal 2. A great way to make money for the library would be holding a car wash. The softball team at my school raised over $400 attheir car wash last year! The car wash could be held in the library parking lot on a Saturday morning. You could ask local high schoolstudents to volunteer to wash the cars. That would be a great way to get students involved with the library. It takes two or threevolunteers to wash a car quickly so you would need at least ten volunteers You could chame around ten dollars per car Fven people