Thanks Vishaalv.
I understand the terminology behind this. However, let's say I configured the port and inform the customer to go and use that port. the customer plug cable into the configured port and start using it, all good. But in a scenario, if someone has access into the switch and they can re-configure the ports and commits. They can do it because the config wouldn't valid/can't see until the port active/exist/UP. I think this situation can sometimes become tricky.
I believe it's by design because to avoid, un-necessary use of system resources.
Thanks.