(NEC 2008) Can anyone tell me why we need both (1) and (3) on this list of permitted methods? Doesn't (1) already include those in (3)?