CalDAV
A network protocol that enables a client to access, modify and synchronise calendar data on a remote server via WebDAV
call deflection
Calls to a particular telephone number are, for example, transferred to a smartphone or other land line connection
call flow display
The call flow display is used to identify the call number dialled by the customer
call hold
A subscriber can put an existing call connection on hold and use the on-hold time, for example, to establish another call connection for questions or to switch between the two calls, if required
call protection
This function blocks incoming calls from particular phone numbers or subscribers or calls received at particular times
call through
A procedure used, for example, to forward a call made on a mobile telephone to an external subscriber number, via an ICT system, so that the ICT system's telephone number is sent to this subscriber
caller ID
Identifies and displays the telephone number, and if relevant, the name of the calling party (if the name is present in Contacts or if it is transferred directly via CNIP)
capacitive touch function
When this is implemented, you can gently touch the surface of the display to trigger a control function
captcha
A fully automated test in which, for example, distorted character strings are queried to check whether the input in web forms is made by a human or a machine
CardDAV
A network protocol that enables a client to access, modify and synchronise contact information on a remote server via WebDAV
CAT-iq
Meaning: "Cordless Advanced Technology" – Internet and quality
CFB
The Call Forwarding Busy function forwards a call if the telephone number is busy
CFNR
The Call Forwarding on No Reply function forwards a call that has not been picked up after a specified time period has passed
CFU
The Call Forwarding Unconditional function forwards a call immediately
ChatGPT
An AI application (generative pre-trained transformer) that is able to communicate with users via text-based messages and images
CLIP
When CLIP is implemented, the caller's telephone number is displayed before the call is accepted
CLIP no screening
When CLIP no screening is implemented, customer-specific telephone numbers are transferred without being verified
cloud computing
In cloud computing, shared computer resources are made available on request, usually over the Internet and on a non-device-specific basis, for example in the form of servers, data storage systems or applications
cloud service
A non-hardware-specific service, usually offered over the Internet
cloud solution
A non-hardware-specific product or service, usually offered over the Internet
cloud storage
External storage for one or more users, usually offered over the Internet
cloud-based
Technology based on cloud computing
CNG
Generates a quiet background noise during pauses in speech in IP telephony to prevent the listener having the impression that the connection has been interrupted
CNIP
When CNIP is implemented, and the caller's name is already present in the telephone's telephone book or in the ICT system, it is displayed on the telephone's display screen even before the call is accepted
code lock function
A code lock is a character string that you enter using the keyboard to trigger a function, for example, to open a door in an Auerswald or FONtevo door terminal system
codec
A codec consists of two functional units for coding and decoding signals and data; codecs are used in video and audio technology
compliance
A device's conformity to the legally applicable standard
computer worm
Malicious program (computer program or script) that can duplicate itself after being executed once and triggers actions on the infected system without infecting other files or boot sectors with its code
context-sensitive
In a technical environment, means the options for affecting a device or software application that are dependent on its current state
CTI
A technology that uses computers and specialised software to control and coordinate telephone services
CTI software
Specialised software for controlling and coordinating telephone services with the computer
cyber attack
Attack on a computer network carried out by a hacker
cyber security
Protection against external attacks on your own computer network
cyber spying
The act or practice of obtaining secrets and information without the permission and knowledge of the information holder using illegal or criminal methods on the Internet, networks or individual computers
cybercrime
Illegal act(s) in the computer or telecommunications sector