Critical Thinking Questions
Case 5-2
​You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
FERPA regulates the confidentiality of ______.

Answers

Answer 1

FERPA regulates the confidentiality of student educational records.

The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. FERPA applies to all schools that receive federal funding and requires them to keep educational records confidential.

These records can include grades, transcripts, and disciplinary records. FERPA gives parents and students over the age of 18 the right to access and request changes to their education records.

Schools must have written permission from the student or parent before disclosing any education records, except in certain circumstances such as in response to a subpoena or to comply with a judicial order. FERPA is an important law that helps safeguard the privacy of student educational information.

For more questions like FERPA click the link below:

https://brainly.com/question/28901153

#SPJ11


Related Questions

Give regular expressions generating the languages of Exercise 1.6.Exercise 1.6.Give state diagrams of DFAs recognizing the following languages. In all parts, the alphabet is {0,1}.a. {w| w begins with a 1 and ends with a 0}b. {w| w contains at least three 1s}c. {w| w contains the substring 0101 (i.e., w = x0101y for some x and y)}d. {w| w has length at least 3 and its third symbol is a 0}e. {w| w starts with 0 and has odd length, or starts with 1 and has even length}f. {w| w doesn’t contain the substring 110}g. {w| the length of w is at most 5}h. {w| w is any string except 11 and 111}i. {w| every odd position of w is a 1}j. {w| w contains at least two 0s and at most one 1}k. { , 0}l. {w| w contains an even number of 0s, or contains exactly two 1s}m. The empty setn. All strings except the empty string

Answers

The answer of DFAs will be: a. ^1.*0$, b. ^.*(1){3,}.*$, c. ^.*0101.*$, d. ^.{2}0.{0,}$, e. ^0.{1,}$|^1.{0,}$, f. ^(?:(?!110).)*$, g. ^.{0,5}$, h. ^(?:(?!11).)*(?:(?!111).)*$, i. ^(?:0.*1|1.*0|1).*$, j. ^(?:0.*0.*){2,}.*$, k. ^$, l. ^(?:(?:0.*){2,}|1.*1.*)$, m. (Empty Set).

What is DFAs?

DFAs (Deterministic Finite Automata) are a type of mathematical model used in computer science and other related fields. They consist of a set of states, a set of input symbols and a set of transition rules. DFAs are used to model the behavior of a system, allowing for the construction of algorithms that can be used to solve certain problems. A DFA can be used to recognize patterns in data and process strings according to a set of rules.

To learn more about DFAs

https://brainly.com/question/15520331

#SPJ1

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.)10.0.12.15192.168.12.25332.188.99.10127.0.0.1240.12.188.1224.15.166.12172.18.188.67

Answers

IP addresses that you could provide the machine are 192.168.12.253, 172.18.188.67, and 10.0.12.15.

Can we use a private IP address in a private network?

One public IP address is required to access the Internet, but we can utilize a private IP address on our private network. Through a single public address, NAT enables numerous devices to access the Internet.

Can all computers on my Home Network connect to the Internet?

All computers on your home network can connect to the internet. You attempt to use your home computer's IP address from your office at work but are unable to connect to the server.

To know more about IP visit:-

brainly.com/question/17387945

#SPJ4

under which condition may you install software on work systems?

Answers

According to the question, It's licensed and authorized according to organizational policy.

What is a software example?

Scheme of operations. The most notable instance of system software that serves as an interface between the user and system components is the operating system. It is a collection of software that manages program execution and provides general services for applications that operate on computers.

How does software work?

In this scenario, commands are transferred from the application software to the system software, then from there to the hardware, which gets the commands as machine code. Each instruction leads the computer to perform an action, such as transferring data, performing a calculation, or changing the order of instructions.

To know more about software visit :

https://brainly.com/question/2802752

#SPJ4

What are two main differences between MLA and APA in-text citations?

Answers

The page number and the last name of the author are cited in MLA format. The last name of the author and the publication year are used in APA style.

What is the main difference between MLA and APA in text citations?One of the most popular citation formats is APA, while another is MLA.The American Psychological Association's seventh edition of its Publication Manual defines APA style.The MLA Handbook, which is in its 9th edition right now, contains the guidelines for MLA style (published by the Modern Language Association).According to both formats, a source citation consists of:An in-text citation with a short parenthetical noteA complete reference list at the conclusion of the essayAlthough each style has its own conventions for things like title capitalization, author names, and date positioning, citations nonetheless appear slightly different in each one.Layout and formatting also differ in several ways. For a properly formatted document in any style, download the Word templates.

To Learn more About APA style refer to:

https://brainly.com/question/1984011

#SPJ4

A survey result shows that cell phone usage among teenagers rose from 63% in 2006 to 71% in 2008. Of the following choices, which two statements about cell phone use among teenagers is true? Cell phone usage rose by 8 percentage points. Cell phone usage rose by 11.2%. Cell phone usage rose by 8 percentage points. Cell phone usage rose by 12.7% Cell phone usage rose by 11.2 percentage points. Cell phone usage rose by 12.7%. Cell phone usage rose by 12.7 percentage points. Cell phone usage rose by 8%. RATIONALE

A developer is reading an article on a web page and sees a hyperlink to another page. They decide to open the link in a new tab of her browser.

Which of the following is true about this process?


The JavaScript from the first tab is shared with the second tab via the hyperlink.


New HTML, CSS, and JavaScript are executed in the second tab when it is opened. Answer


The second tab displays the new page, then runs its HTML.


The second tab compiles the new page’s JavaScript before loading.

Answers

In the survey results, cell phone usage among teenagers rose from 63% to 71%.


What are the true statements?

The two true statements are:

Cell phone usage rose by 8 percentage points (71-63) Cell phone usage rose by 12.7% ([71-63]/63*100).

Regarding the developer opening a hyperlink in a new tab, the true statement is: New HTML, CSS, and JavaScript are executed in the second tab when it is opened.

This means that the second tab loads a new web page with its own set of resources, and does not share JavaScript or any other code with the first tab.

The HTML, CSS, and JavaScript for the new page are fetched and executed independently in the second tab.

Read more about HTML here:

https://brainly.com/question/4056554

#SPJ1

You have implemented a fairly complicated access list. It has six different conditions for limiting access to your network. A packet matches the condition on the second line of the access list. What happens next

Answers

If a packet matches the condition on the second line of the access list, the next step depends on the specific configuration of the access list and the network device or software implementing it.

Typically, when a packet matches a condition in an access list, the device will proceed sequentially through the remaining lines of the access list, checking each subsequent condition until a match is found or until the end of the access list is reached. This means that the device will evaluate the packet against the conditions on the subsequent lines to determine if any further restrictions or permissions apply to the packet.

If a subsequent condition is met, the corresponding action specified in the access list (such as permit, deny, or other actions) will be applied to the packet. If no subsequent condition is met, the device may default to a pre-defined action, such as denying the packet or following a default permit or deny rule.

It is important to note that the specific behavior can vary depending on the network device, operating system, and configuration settings in place. It is recommended to consult the documentation or configuration guide for the specific network device or software being used to understand the exact behavior in your case.

Learn more about configuration here

https://brainly.com/question/30278465

#SPJ11

Can anybody answer this please

Can anybody answer this please

Answers

Answer: Managing memory allocation for all applications (first one).

Identify the types of information that are necessary to communicate with emergency responders.

Answers

The following information are necessary to communicate with emergency responders:

The chemicals that are involved in an incident.Any other hazards present in the laboratory.How the incident occurred or happened.

Who is an emergency responder?

An emergency responder can be defined as an individual who has the requisite training, license and expertise to respond to an unexpected and dangerous situation.

The examples of emergency.

Some examples of an unexpected and dangerous situation are:

FireEarthquakeFlood

In conclusion, the following information are necessary to communicate with emergency responders:

The chemicals that are involved in an incident.Any other hazards present in the laboratory.How the incident occurred or happened.

Read more on emergency responders here: https://brainly.com/question/20721365

____ is the order of arrangement of files and folders

Answers

Answer:

Organization is the order of arrangement of files and folders.

Numerical is the definition of that

Which feature of a file system is responsible for keeping track of changes in the system?

Answers

Answer:

Journaling

Explanation:

Journaling is a file system feature that is responsible for keeping track of changes in the system.

if int a = 4, int *b = &a , int **c= &b;
what is the value store in c.

Answers

Answer:

5.

Explanation:

Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools

Answers

virus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougewarevirus/rougeware

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?
Port address translation
Spanning tree protocol
EIGRP
Port forwarding

Answers

Port forwarding techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host.

What is NAT router?

Network address translation (NAT) is the term used. Prior to transferring the data, it allows for the mapping of several local private addresses to a public address. Both businesses and the majority of home routers use NAT to allow multiple devices to share a single IP address.

Suppose a laptop is attached to a wireless router at home. For directions to their preferred restaurant, someone uses the laptop. This request is sent from the laptop to the router in the form of a packet, which is then forwarded to the web. But first, the router converts the outgoing IP address from a personal local address to a public address.

Learn more about NAT router

https://brainly.com/question/13105976

#SPJ4

¿Quién recibe la orden de ejecución de un programa enviada por el usuario?

Answers

Answer:

El sistema operativo.

Explanation:

En ciencias de la computación, una orden es una instrucción a un sistema operativo de computadora para realizar una tarea específica. Generalmente, una orden se emite a través de una interfaz de línea de órdenes de otro programa. Así, se trata de una instrucción a un programa de computadora para que actúe como intérprete para resolver un problema.  

Por ejemplo, podemos pedir a través de una orden que muestre el contenido de una carpeta, buscar un archivo en particular y especificar mediante parámetros adicionales cómo se debe realizar esta acción (por ejemplo, utilizando expresiones regulares para realizar una búsqueda).

Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?

Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?

Answers

Answer:

C. Event is correct

Explanation:

what are the social and ethical consequences of emerging technology hard to predict.

Answers

Answer:

The social and ethical consequences of emerging technology are hard to predict since it is truly impossible to see how technology will be applied to situations that have not really occurred yet.  

Explanation:

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

What does it mean when a computer is processing
A computer is doing a task
B user is thinking
C the computer is recharging
D software is engaging

Answers

When a computer is processing it means that (A) computer is doing a task.

State the functions of the CPU.

Any digital computer system's central processing unit (CPU), which consists of the system's main memory, control unit, and the arithmetic-logic unit, is its main part. It serves as the actual brain of the entire computer system, connecting numerous peripherals including input/output devices and auxiliary storage units. On an integrated circuit chip known as a microprocessor, the Control Processing Unit (CPU) of contemporary computers is housed.

The Central Processing Unit (CPU) is distinguished by the following functions:

As the brain of the computer, the CPU is regarded.All data processing processes are carried out by the CPU.Information including data, preliminary findings, and directions are saved (program).All computer parts follow its instructions when operating.

To learn more about the Central Processing Unit, use the link given
https://brainly.com/question/26411941
#SPJ9

Select the correct answer. In the decision-making process, after you have chosen the right solution, what is the next step? A. Act on your decision. B. Reflect on your decision. C. Gather information. D. Identify the problem. Reset Next

Answers

In the decision-making process, after you have chosen the right solution, the next step is to act on your decision.

How do you act on your decision?

A person act on their decision-making by putting those decision taken into use.

Therefore,  In the decision-making process, after you have chosen the right solution,  the next step is to Act on your decision as it entails bringing the decision to light.

Learn more about decision-making from

https://brainly.com/question/3432001

#SPJ1

Please help me!!!

Use searching laterally to find more out about obesitymyths.com and if it is credible. Share your findings here.

Answers

Explanation:

I am verry bad at computer science. ...........

Using the search tool, it is discovered that the website is not a credible website.

Why is the website not credible?

This is due to the fact that the domain of the website has been put up for sale. The website does not contain information about what its name suggests.

There is a transfer of ownership waiting to happen. Hence we can conclude that it is not a credible website.

Read more on websites here: https://brainly.com/question/1382377

#SPJ2

Using more than one list to store related data is called _____________ lists.
in python

Answers

Using more than one list to store related data is called parallel lists in python.

What are Store related data?

A set of elements are stored in an array, a form of data structure used in computer science, where each element is uniquely identified by at least one array index or key.

A mathematical formula may identify the position of each element in an array given its index tuple.

A collection of data is represented by two or more arrays when using parallel arrays, where each matching array index stands for a field that corresponds to a specific record.

If there were two arrays, one for names and one for ages, the elements at names and ages, for instance, would describe the name and age of the third individual.

Therefore, Using more than one list to store related data is called parallel lists in python.

To learn more about rays, refer to the link:

https://brainly.com/question/17491571

#SPJ6

ANY ADVICE?
i have to spend summer ( and the next 4 years) with a family who hates me. what should I do.

Answers

Answer:

Talk to a close friend or adult that you trust and have the power and explain to them why you don't want to go. Good luck.

Answer:

You should try talking to a person that could maybe help you or a family member that you trust who will let you stay with them for the summer and 4 years. If you don't have any one else I would try being nice, or just ignore them and live on with your life. I don't really know what else to say sense I don't know your life experience.

Explanation:

Kyra is protesting corruption in the mayoral office. She is afraid that the mayor has access to her emails where she discusses his wrongdoings. Which of the following laws protects her electronic communication from being accessed by the government or law enforcement agencies?

Answers

Answer:i don’t know sorry

Explanation:

What will you see on the next line?
>>>int(12.8)
___

What will you see on the next line?>>>int(12.8)___

Answers

Answer:

12

Explanation:

When you use the int() function on a float, it only cuts off everything past the decimal. Literally all it does. Also, the int() function doesn't round the number. Thus, proving the answer is 12.

hope i helped :D

Answer: 12

Explanation: got it right on edgen

sharing the contents of a phr with providers creates an opportunity to ____________.

Answers

Sharing the contents of a PHR (Personal Health Record) with providers creates an opportunity to improve patient outcomes and enhance the quality of care.

PHRs are digital platforms that allow individuals to store and manage their health information, including medical history, medications, allergies, and test results. By sharing this information with healthcare providers, patients can benefit from a more coordinated and efficient care experience. Providers can access the patient's up-to-date health information, enabling them to make better-informed decisions and develop more personalized treatment plans. Moreover, sharing a PHR with providers can help reduce medical errors, prevent unnecessary tests and procedures, and increase patient engagement. Patients can actively participate in their care by reviewing their health information, identifying potential problems, and communicating with their providers. Additionally, sharing a PHR with providers can improve communication between patients and their care teams, enhancing the overall patient experience. In summary, sharing the contents of a PHR with providers creates an opportunity to improve patient care, reduce medical errors, increase patient engagement, and enhance the quality of care.

Know more about Personal Health Record here:

https://brainly.com/question/29392443

#SPJ11

a force of 50N is applied on a wedge of area 0.05cm2 to split a stone into many parts how large is the pressure exerted on the wedge​?plssssss help

Answers

Answer:

p= f/a.......

f= 50N

a= 0.05cm2= 0.000005m2

...P=50/0.000005= 10^7

escribe un texto argumentativo donde expreses tu opinión acerca del acoso cibernético ​

Answers

Respuesta:
El acoso cibernético es uno de los problemas menos tratados por la sociedad y a la vez uno muy recurrente. Este tipo de acoso rastrea a la persona a través de redes sociales y la investiga con fines degradantes para el afectado, sin embargo, para prevenir este se deben tomar medidas de seguridad como no compartir toda tu vida en el internet y así evitar estos casos que generalmente terminan con abuso sexual o secuestro.

in packet switching, the voice signal is first digitized and then chopped up into a series of packets.

Answers

In packet switching, the voice signal is first digitized and then chopped up into a series of packets: True.

What is packet switching?

Packet switching can be defined as a data transmission mode in which an information or message (voice signal) is chopped into different packet parts that are independently sent, over the optimum route for each packet, and then, reassembled at the destination.

In packet switching, the information or message (voice signal) would first be digitized and then, chopped up into a series of packets comprising the voice information alongside the source and destination.

In conclusion, packet switching is a technology which enhanced and facilitated long-distance digital data communication.

Read more on packet switching here: https://brainly.com/question/28090820

#SPJ1

Complete Question:

In packet switching, the voice signal is first digitized and then chopped up into a series of packets. True or False?

Ive accidently said yes to a 30 day free trial for amazon music and i have cancelled it but i went on my alexa abd it still plays unlimited music?? Plz someone help!!

Answers

Answer:

It might take some time to cancel

Email Amazon music about it and see what they say or search

an information security strategy document that includes specific links to an organization's business activities is primarily an indicator of

Answers

An information security strategy document that contains particular links to an organization's business activities is mainly an indicator of "alignment".

An information security strategy document provides an organization with a road map for information and information infrastructure protection with objectives and goals that ensure the capabilities provided are aligned with business objectives and the organization's risk profile.

Basically, it is a high-level plan for how the organization will secure its assets during the next three to five years. Since cyber threats and technology can both change unpredictably, the organization almost certainly has to update its strategy sooner than three years from now

This document mainly includes information such as threat and vulnerability assessment, vulnerability management, business architecture,  resiliency, design, and others.

You can learn more about information security strategy document at

https://brainly.com/question/30159795

#SPJ4

Other Questions
The financial services department of your company offers a competitive leadership program. After screening and interviewing all applicants, the selection committee has chosen to extend an invitation to Kallee Davalos and Matt Rightson. You have been asked to invite Kailee and Matt to participate in the leadership program. Should the tone for this message be formal or informal? Formal Informal Which communication channel would be most appropriate? Phone call Face-to-face meeting Formal report Instant message Firms operating in a market situation that creates _____ sell their product with other firms who produce identical or extremely similar products. FILL IN THE BLANK. when _____ is used, fuzzy traces are built up, which are more enduring and less likely to be forgotten than _____ traces type the value that best answers the question. identify the daily individual income that the united nations defines as living in poverty. select all statements that correctly describe rod cells and cone cells. A. the opsin proteins in the membranes of both rods and cones have the same retinal pigments. B. absorption of light by rods decreases neurotransmitter release, while absorption of light by cones results in increased neurotransmitter release. C. all rod cells have the same type of opsin protein; each type of cone (red, green, blue) has a different type of opsin protein. D. absorption of light by both rods and cones alters the shape of their retinal pigments. Watson and Crick, the pair of researchers who determined the structure of DNA, deduced the pairing of nucleotides in DNA using information learned from Erwin Chargaff. Which of the following is the correct pairing of nucleotides in DNA?a guanine with adenine; cytosine with adenineb adenine with thymine; guanine with cytosinec cytosine with guanine; uracil with adenined cytosine with adenine; thymine with guanine Twice a number decrease by four is less than 8 an open vertical tube has water in it. a tuning fork vibrates over its mouth. as the water level is lowered in the tube, the seventh resonance is heard when the water level is 217.75 cm below the top of the tube. A solar sailplane is going from Earth to Mars. Its sail is oriented to give a solar radiation force of FRad = 7.70 102 N. The gravitational force due to the Sun is 173 N and the gravitational force due to Earth is 1.00 102 N. All forces are in the plane formed by Earth, Sun, and sailplane. The mass of the sailplane is 14,900 kg. What is the magnitude of the acceleration on the sailplane? Answer in m/s2 A nurse is teaching a client who has heart failure about engaging in an exercise program. Which of the following statements by the client indicates an understanding of the teaching? A. "I will slow my walking pace of I experience chest pain."B. "I will work to achieve 60 minutes of exercise each day."C. "I will wait 30 min after eating before exercising."D. "I will make sure I can still talk while exercising." Which set correctly orders the atoms from HIGHEST to LOWEST ionization energy? When we say that liquid water is unstable on Mars, we mean thata) a cup of water would shake uncontrollablyb) it is impossible for liquid water to exist on the surfacec) any liquid water on the surface would quickly either freeze or evaporate Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources.If Minisha is able to accomplish this task successfully, which of the following must be true?a) Minisha is a member of the Enterprise Admins group in both organizations.b) Minisha is a member of the Domain Admins group in both organizations.c) Minisha has run the following command: Get-ADForest | select SchemaMaster,DomainNamingMaster.d) Minisha has run the following command: Set-ADDomainMode Identity domainX.com -DomainMode Windows2012R2Domain. In which of the following stages of the adoption process does a consumer consider whether trying a new product makes sense?A) interestB) adoptionC) evaluationD) awarenessE) trial Draw and label the height of each parallelogram. ______ are known for the emphasis that they place on the scientific method.a. classicalistsb. hedonistsc. structuralistsd. positivists Subtract. Simplify, if possible.4 1/2-2 3/2(34Give your answer as a mixed number. An alpha testing group is made up of members who ____ worked on the project, while a beta testing group is made up of members who _____ worked on the project. Assume, for Brazil, that the domestic price of apples without international trade is higher than the world price of apples. This suggests that, in the production of apples, O A, Brazil has a comparative advantage over other countries and Brazil will import apples. O B. Brazil has a comparative advantage over other countries and Brazil will export apples. OC. other countries have a comparative advantage over Brazil and Brazil will import apples. O D. other countries have a comparative advantage over Brazil and Brazil will export apples. John Sweeney is an investment advisor who is attempting to construct an "optimal portfolio" for a client who has $400,000 cash to invest. There are ten different investments, falling into four broad categories that John and his client have identified as potential candidates for this portfolio. The following table lists the investments and their important characteristics. Note that Unidyne equities (stocks) and Unidyne debt (bonds) are two separate investments, whereas First General REIT is a single investment that is considered both an equities and a real estate investment. Expected Annual Liquidity RiskCategory Investment After-Tax Return Factor FactorEquities Unidyne Corp. 15.0% 100 60Col. Mustard Restaurant 17.0% 100 70First General REIT 17.5% 100 75Debt Metropolitan Electric 11.8% 95 20Unidyne Corp. 12.2% 92 30Lemonville Transit 12.0% 79 22Real Estate Fairview Apartment Partnership 22.0% 0 50First General REIT (see above) (see above) (see above)Money T-Bill Account 9.6% 80 0Money Market Fund 10.5% 100 10All Savers Certificates 12.6% 0 0Formulate and solve a linear program to accomplish John's objective as an investment advisor, which is to construct aportfolio that maximizes his clients total expected after-tax return over the next year, subject to the following constraintsplaced upon him by the client for the portfolio:1. Its (weighted) average liquidity factor must be at least 65.2. The (weighted) average risk factor must be no greater than 55.3. At most, $60,000 is to be invested in Unidyne stocks or bonds.4. No more than 40% of the investment can be in any one category except the money category.5. No more than 20% of the investment can be in any one investment except the money market fund.6. At least $1,000 must be invested in the money market fund.7. The maximum investment in All Savers Certificates is $15,000.8. The minimum investment desired for debt is $90,000.9. At least $10,000 must be placed in a T-bill account.