in-memorycomputingcustomerrelationshipmanagement(CRM)data-drivendecisionmakingbyteWiMaxsupportactivitiesopticalfibercloudcomputinghumanresourcesmanagement(HRM)systemmanagementinformationsystems(MIS)InternetProtocolVersion 6(IPv6)randomaccessmemory(RAM)networkprivatebranchexchange(PBX)businessprocesscustomerrelationshipmanagement(CRM)systemwirelessrouterpowerofbuyersopensourcesoftwareradiofrequencyidentification(RFID)sustainingtechnologieshertz(Hz)computerutilitysoftwarebits persecond(bps)programminglanguagetalentmanagementtwistedpairwiresoperationsmanagementopticalcharacterrecognition(OCR)softwareas aservice(SaaS)benchmarkn-tierdemandforecastaccuracy(DFA)threat ofsubstitutesinformationsystemecosystemsentimentanalysispower ofsuppliersmicrowavetransmissionstrategicenablercreativedestructionobject-orientedprogrammingvisibilityopticalscannerspeer-to-peernetworkenterprisearchitecture(EA)chiefinformationofficer(CIO)Moore'sLawelectronicdatainterchange(EDI)low costleadershipstrategyswitchingcostslegacysystemsnetworkeffectsglobalpositioningsystems(GPS)humancapitalmanagement(HCM)enterpriseresourceplanning(ERP)valuechainmodellocal areanetwork(LAN)rivalryamongexistingcompetitorsASCIIcodethreatof newentrantssupply chainmanagement(SCM)client-servernetworkEthernetcentralprocessingunit (CPU)primaryactivitieswifiinformationtechnology(IT)bandwidthWeb2.0crisismanagementteamTCP/IPapplicationsoftwareeXtensibleBusinessReportingLanguage(XBRL)disruptiveinnovationcompetitiveadvantageworkforcemanagementmodulesystemsoftwarecommercialoff-the-shelf(COTS)productdifferentiationstrategysoftwarevoiceover IP(VoIP)e-discoveryfinancialmanagementsystembullwhipeffectwebbeacon orweb bugfocusednichestrategysourcecodewavelengthvirtualizationcircuit-switchednetworkpacketswitchingdata-drivendecisionmakingtransistoroperatingsystem(OS)e-governmentbusinessprocessmanagement(BPM)informationcoaxialcablesBluetoothbusinessintelligenceinformation andcommunicationstechnology (ICT)socialnetworkingsitesdigitalsubscriberlines(DSL)middlewareuser-generatedcontent(UGC)in-memorycomputingcustomerrelationshipmanagement(CRM)data-drivendecisionmakingbyteWiMaxsupportactivitiesopticalfibercloudcomputinghumanresourcesmanagement(HRM)systemmanagementinformationsystems(MIS)InternetProtocolVersion 6(IPv6)randomaccessmemory(RAM)networkprivatebranchexchange(PBX)businessprocesscustomerrelationshipmanagement(CRM)systemwirelessrouterpowerofbuyersopensourcesoftwareradiofrequencyidentification(RFID)sustainingtechnologieshertz(Hz)computerutilitysoftwarebits persecond(bps)programminglanguagetalentmanagementtwistedpairwiresoperationsmanagementopticalcharacterrecognition(OCR)softwareas aservice(SaaS)benchmarkn-tierdemandforecastaccuracy(DFA)threat ofsubstitutesinformationsystemecosystemsentimentanalysispower ofsuppliersmicrowavetransmissionstrategicenablercreativedestructionobject-orientedprogrammingvisibilityopticalscannerspeer-to-peernetworkenterprisearchitecture(EA)chiefinformationofficer(CIO)Moore'sLawelectronicdatainterchange(EDI)low costleadershipstrategyswitchingcostslegacysystemsnetworkeffectsglobalpositioningsystems(GPS)humancapitalmanagement(HCM)enterpriseresourceplanning(ERP)valuechainmodellocal areanetwork(LAN)rivalryamongexistingcompetitorsASCIIcodethreatof newentrantssupply chainmanagement(SCM)client-servernetworkEthernetcentralprocessingunit (CPU)primaryactivitieswifiinformationtechnology(IT)bandwidthWeb2.0crisismanagementteamTCP/IPapplicationsoftwareeXtensibleBusinessReportingLanguage(XBRL)disruptiveinnovationcompetitiveadvantageworkforcemanagementmodulesystemsoftwarecommercialoff-the-shelf(COTS)productdifferentiationstrategysoftwarevoiceover IP(VoIP)e-discoveryfinancialmanagementsystembullwhipeffectwebbeacon orweb bugfocusednichestrategysourcecodewavelengthvirtualizationcircuit-switchednetworkpacketswitchingdata-drivendecisionmakingtransistoroperatingsystem(OS)e-governmentbusinessprocessmanagement(BPM)informationcoaxialcablesBluetoothbusinessintelligenceinformation andcommunicationstechnology (ICT)socialnetworkingsitesdigitalsubscriberlines(DSL)middlewareuser-generatedcontent(UGC)

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. in-memory computing
  2. customer relationship management (CRM)
  3. data-driven decision making
  4. byte
  5. WiMax
  6. support activities
  7. optical fiber
  8. cloud computing
  9. human resources management (HRM) system
  10. management information systems (MIS)
  11. Internet Protocol Version 6 (IPv6)
  12. random access memory (RAM)
  13. network
  14. private branch exchange (PBX)
  15. business process
  16. customer relationship management (CRM) system
  17. wireless router
  18. power of buyers
  19. open source software
  20. radio frequency identification (RFID)
  21. sustaining technologies
  22. hertz (Hz)
  23. computer
  24. utility software
  25. bits per second (bps)
  26. programming language
  27. talent management
  28. twisted pair wires
  29. operations management
  30. optical character recognition (OCR)
  31. software as a service (SaaS)
  32. benchmark
  33. n-tier
  34. demand forecast accuracy (DFA)
  35. threat of substitutes
  36. information system
  37. ecosystem
  38. sentiment analysis
  39. power of suppliers
  40. microwave transmission
  41. strategic enabler
  42. creative destruction
  43. object-oriented programming
  44. visibility
  45. optical scanners
  46. peer-to-peer network
  47. enterprise architecture (EA)
  48. chief information officer (CIO)
  49. Moore's Law
  50. electronic data interchange (EDI)
  51. low cost leadership strategy
  52. switching costs
  53. legacy systems
  54. network effects
  55. global positioning systems (GPS)
  56. human capital management (HCM)
  57. enterprise resource planning (ERP)
  58. value chain model
  59. local area network (LAN)
  60. rivalry among existing competitors
  61. ASCII code
  62. threat of new entrants
  63. supply chain management (SCM)
  64. client-server network
  65. Ethernet
  66. central processing unit (CPU)
  67. primary activities
  68. wifi
  69. information technology (IT)
  70. bandwidth
  71. Web 2.0
  72. crisis management team
  73. TCP/IP
  74. application software
  75. eXtensible Business Reporting Language (XBRL)
  76. disruptive innovation
  77. competitive advantage
  78. workforce management module
  79. system software
  80. commercial off-the-shelf (COTS)
  81. product differentiation strategy
  82. software
  83. voice over IP (VoIP)
  84. e-discovery
  85. financial management system
  86. bullwhip effect
  87. web beacon or web bug
  88. focused niche strategy
  89. source code
  90. wavelength
  91. virtualization
  92. circuit-switched network
  93. packet switching
  94. data-driven decision making
  95. transistor
  96. operating system (OS)
  97. e-government
  98. business process management (BPM)
  99. information
  100. coaxial cables
  101. Bluetooth
  102. business intelligence
  103. information and communications technology (ICT)
  104. social networking sites
  105. digital subscriber lines (DSL)
  106. middleware
  107. user-generated content (UGC)