Archives: Glossary

@ (at pronounce)

@-  Pronounced “at” as in an InternetInternet- (upper case I) The vast collection of inter-conne… More addressaddress. (1) A number, character, or group of characters wh… More such as

Abandoned Cable 

Abandoned Cable – Any cabling, from Riser closet to serverServer- A computer, or a software package, that provides a s… More room to end-user, which is no longer being used, is the wrong cable type (i.e. riser in a plenum ceiling) or not tagged for future use. It is defined as Installed communications cable that is not …

Abandoned Cable  Read More »

Abandoned Call

Abandoned Call- A call or other type of contact to a call center that is abandoned before the call is answered. Calls in which the caller hangs up almost immediately may or may not be counted as abandoned. When configuring settings on an ACD a minimum length of time can be set before it would …

Abandoned Call Read More »


abstractionabstraction. The separation of the logical properties of da… More. The separation of the logical properties of datadata. Representations of facts, concepts, or instructions i… More or functionfunction. (1) (ISO) A mathematical entity whose value, name… More from its implementationimplementation. The process of translating a design into ha… More in a computer programcomputer program. See: program. More. See: encapsulationEncapsulation. (IEEE) A software

Abstraction Read More »


The ability and means to communicate with or otherwise interact with a systemsystem. (1) (ANSI) People, machines, and methods organized … More, to use systemsystem. (1) (ANSI) People, machines, and methods organized … More resources to handle information, to gain knowledge of the information the systemsystem. (1) (ANSI) People, machines, and methods organized … More contains, or to …

Access Read More »


A fee charged subscribers or other telephone companies by a local exchange carrierA local exchange carrier (LEC) is the term used in the U.S. … More for the use of its local exchange networks.

Access Control  

The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities.

Technology Elevated