1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
14

_____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub

scriber stays on the telephone.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
3 0

Answer: a) busy hour  b) Average handle time.

Explanation:

a) In order to design a telephony circuit, trunk, or call center, it is needed to take into account the busiest calling hour (as a "sliding" 60-minute period) in one day, or week, month or year, generally calculated as an average.

This period is called the "busy hour" and is used to compute the traffic intensity, in Erlangs, considering that if the circuit is busy 100% of the time during 3600 seconds, it will be cursing 1 Erl of traffic.

This traffic can result from 60 calls of 1 min each, 36 calls of 100 sec each, or any combination that have the same outcome of 1 Erl.

b) In order to define, for instance, the number of employees in a call center, a very important parameter is the average time used for each call, adding the queuing time, the true talk time and any other time needed to  set up a successful call, i.e., the time that the subscriber stays on the phone after putting the call.

This time is known as AHT (Average Handle Time).

You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
For window 7 explain the steps you will use to find the available program you will list.
Alex_Xolod [135]
Follow these steps.
1. Make sure that your pc is on.
2. Press your Window key - on your bottom left of your keyboard you will see a window key. 
3. After pressing it will show a tab on your bottom left of your monitor.
4. On that tab you will see an (All Programs) text.
5. Click it and it will show all programs available on your pc.
8 0
3 years ago
In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the
ki77a [65]
True  ------------------------------------------
8 0
3 years ago
Read 2 more answers
Polymorphism means ______________.
Westkost [7]

Answer:

Polymorphism means that a variable of supertype can refer to a subtype object.

Explanation:

For example, in Python programming language, a function that accepts an iterable object uses the concept of polymorphism because that function can accept strings, lists, tuples as arguments.

5 0
3 years ago
Read 2 more answers
Your older brother Max tells you about his secret plan to hack into his college’s computer network and change all of his grades.
viktelen [127]

Answer:

Tell him he could get kicked out of school and it can possibly show up on his record and lessen his chances of finding a job since no one will trust him. He should just focus and get his grades up instead of risking everything and "taking the easy way out".

Explanation:

6 0
2 years ago
Other questions:
  • Which of these is a weakness of written communication?
    8·1 answer
  • .How does kinetic energy affect the stopping distance of a vehicle traveling at 30 mph compared to the same vehicle traveling at
    13·1 answer
  • Which member of the restaurant and food/beverage service career is mostly likely to plan menus and direct worker
    6·2 answers
  • Error messages begin with the ____ symbol.
    6·2 answers
  • What does not stand for​
    15·2 answers
  • Help brainleist giving exam
    15·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • In addition to good design sense, what else do web designers need to be proficient in?
    13·1 answer
  • What tool allows you to search external competitive intelligence research?
    14·1 answer
  • What is computer viras? Loist 2 preventive measures against it​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!