1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
4 years ago
14

_____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub

scriber stays on the telephone.
Computers and Technology
1 answer:
Butoxors [25]4 years ago
3 0

Answer: a) busy hour  b) Average handle time.

Explanation:

a) In order to design a telephony circuit, trunk, or call center, it is needed to take into account the busiest calling hour (as a "sliding" 60-minute period) in one day, or week, month or year, generally calculated as an average.

This period is called the "busy hour" and is used to compute the traffic intensity, in Erlangs, considering that if the circuit is busy 100% of the time during 3600 seconds, it will be cursing 1 Erl of traffic.

This traffic can result from 60 calls of 1 min each, 36 calls of 100 sec each, or any combination that have the same outcome of 1 Erl.

b) In order to define, for instance, the number of employees in a call center, a very important parameter is the average time used for each call, adding the queuing time, the true talk time and any other time needed to  set up a successful call, i.e., the time that the subscriber stays on the phone after putting the call.

This time is known as AHT (Average Handle Time).

You might be interested in
If i were to give you free points woulld you take them?
kipiarov [429]

Answer:

D) friend me

Explanation:

6 0
3 years ago
Read 2 more answers
Help. serious help. the acc im using right now cant be ridded of by myself from being unable to have a pass. i need to contact a
anzhelika [568]

Answer:

Can't really help you... But you can try emailing support.

7 0
2 years ago
Which of the following describes the phishing method of information security crime?
Marianna [84]
<span>C. pretending to be someone else when asking for information</span>
3 0
3 years ago
Read 2 more answers
PLZZZZZZZZZZZZZZZZZ HELP I WILL GIVE 85 POINTS AND MARK BRAINLIEST
nirvana33 [79]

Answer:

Hey here is a tip: for your essay put your letters in white ink at the end  so it looks like 300 words.

Explanation:

8 0
3 years ago
What is software?
bogdanovich [222]

Answer:

B

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • Which option will enable Mina to apply several formats to the spreadsheet cells at the same time?
    5·1 answer
  • What are some programs that you have used that have condition-controlled loops and count-controlled loops?
    10·1 answer
  • A computer reads a sequence from top to bottom and left to right? True or False
    6·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • Write a method so that the main() code below can be replaced by simpler code that calls method calcMilesTraveled(). Original mai
    11·1 answer
  • Several disaster relief nonprofits want to create a centralized application and repository of information so that they can effic
    7·1 answer
  • What is speaker?.....​
    13·1 answer
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
  • Choose ALL guidelines listed below pertaining to fair use.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!