visibilityinformationdata-drivendecisionmakingcustomerrelationshipmanagement(CRM)systemeXtensibleBusinessReportingLanguage(XBRL)user-generatedcontent(UGC)electronicdatainterchange(EDI)Moore'sLawprivatebranchexchange(PBX)benchmarknetworkcloudcomputingprimaryactivitieslegacysystemschiefinformationofficer(CIO)enterpriseresourceplanning(ERP)switchingcostsnetworkeffectssystemsoftwaresoftwaresocialnetworkingsitessentimentanalysisEthernetlocal areanetwork(LAN)globalpositioningsystems(GPS)in-memorycomputingproductdifferentiationstrategyinformationsystemworkforcemanagementmoduleecosystemcoaxialcablesbullwhipeffectcentralprocessingunit (CPU)opticalscannersbusinessintelligencecreativedestructione-discoveryhumancapitalmanagement(HCM)financialmanagementsystemstrategicenableropensourcesoftwaresoftwareas aservice(SaaS)managementinformationsystems(MIS)e-governmentvoiceover IP(VoIP)threat ofsubstitutesinformationtechnology(IT)rivalryamongexistingcompetitorsdemandforecastaccuracy(DFA)wirelessrouterpowerofbuyerscomputerBluetoothsourcecodefocusednichestrategydisruptiveinnovationhumanresourcesmanagement(HRM)systembytemicrowavetransmissionsupply chainmanagement(SCM)utilitysoftwareopticalcharacterrecognition(OCR)circuit-switchednetworkcrisismanagementteamhertz(Hz)enterprisearchitecture(EA)businessprocessmanagement(BPM)opticalfiberobject-orientedprogrammingclient-servernetworkoperatingsystem(OS)randomaccessmemory(RAM)businessprocessapplicationsoftwarecommercialoff-the-shelf(COTS)radiofrequencyidentification(RFID)valuechainmodelASCIIcodewebbeacon orweb bugtwistedpairwireswifin-tierWiMaxsustainingtechnologiesdigitalsubscriberlines(DSL)bandwidthprogramminglanguagelow costleadershipstrategypower ofsuppliersvirtualizationoperationsmanagementmiddlewarecompetitiveadvantagetalentmanagementpeer-to-peernetworkdata-drivendecisionmakingtransistorInternetProtocolVersion 6(IPv6)Web2.0TCP/IPinformation andcommunicationstechnology (ICT)packetswitchingsupportactivitiesbits persecond(bps)customerrelationshipmanagement(CRM)wavelengththreatof newentrantsvisibilityinformationdata-drivendecisionmakingcustomerrelationshipmanagement(CRM)systemeXtensibleBusinessReportingLanguage(XBRL)user-generatedcontent(UGC)electronicdatainterchange(EDI)Moore'sLawprivatebranchexchange(PBX)benchmarknetworkcloudcomputingprimaryactivitieslegacysystemschiefinformationofficer(CIO)enterpriseresourceplanning(ERP)switchingcostsnetworkeffectssystemsoftwaresoftwaresocialnetworkingsitessentimentanalysisEthernetlocal areanetwork(LAN)globalpositioningsystems(GPS)in-memorycomputingproductdifferentiationstrategyinformationsystemworkforcemanagementmoduleecosystemcoaxialcablesbullwhipeffectcentralprocessingunit (CPU)opticalscannersbusinessintelligencecreativedestructione-discoveryhumancapitalmanagement(HCM)financialmanagementsystemstrategicenableropensourcesoftwaresoftwareas aservice(SaaS)managementinformationsystems(MIS)e-governmentvoiceover IP(VoIP)threat ofsubstitutesinformationtechnology(IT)rivalryamongexistingcompetitorsdemandforecastaccuracy(DFA)wirelessrouterpowerofbuyerscomputerBluetoothsourcecodefocusednichestrategydisruptiveinnovationhumanresourcesmanagement(HRM)systembytemicrowavetransmissionsupply chainmanagement(SCM)utilitysoftwareopticalcharacterrecognition(OCR)circuit-switchednetworkcrisismanagementteamhertz(Hz)enterprisearchitecture(EA)businessprocessmanagement(BPM)opticalfiberobject-orientedprogrammingclient-servernetworkoperatingsystem(OS)randomaccessmemory(RAM)businessprocessapplicationsoftwarecommercialoff-the-shelf(COTS)radiofrequencyidentification(RFID)valuechainmodelASCIIcodewebbeacon orweb bugtwistedpairwireswifin-tierWiMaxsustainingtechnologiesdigitalsubscriberlines(DSL)bandwidthprogramminglanguagelow costleadershipstrategypower ofsuppliersvirtualizationoperationsmanagementmiddlewarecompetitiveadvantagetalentmanagementpeer-to-peernetworkdata-drivendecisionmakingtransistorInternetProtocolVersion 6(IPv6)Web2.0TCP/IPinformation andcommunicationstechnology (ICT)packetswitchingsupportactivitiesbits persecond(bps)customerrelationshipmanagement(CRM)wavelengththreatof newentrants

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. visibility
  2. information
  3. data-driven decision making
  4. customer relationship management (CRM) system
  5. eXtensible Business Reporting Language (XBRL)
  6. user-generated content (UGC)
  7. electronic data interchange (EDI)
  8. Moore's Law
  9. private branch exchange (PBX)
  10. benchmark
  11. network
  12. cloud computing
  13. primary activities
  14. legacy systems
  15. chief information officer (CIO)
  16. enterprise resource planning (ERP)
  17. switching costs
  18. network effects
  19. system software
  20. software
  21. social networking sites
  22. sentiment analysis
  23. Ethernet
  24. local area network (LAN)
  25. global positioning systems (GPS)
  26. in-memory computing
  27. product differentiation strategy
  28. information system
  29. workforce management module
  30. ecosystem
  31. coaxial cables
  32. bullwhip effect
  33. central processing unit (CPU)
  34. optical scanners
  35. business intelligence
  36. creative destruction
  37. e-discovery
  38. human capital management (HCM)
  39. financial management system
  40. strategic enabler
  41. open source software
  42. software as a service (SaaS)
  43. management information systems (MIS)
  44. e-government
  45. voice over IP (VoIP)
  46. threat of substitutes
  47. information technology (IT)
  48. rivalry among existing competitors
  49. demand forecast accuracy (DFA)
  50. wireless router
  51. power of buyers
  52. computer
  53. Bluetooth
  54. source code
  55. focused niche strategy
  56. disruptive innovation
  57. human resources management (HRM) system
  58. byte
  59. microwave transmission
  60. supply chain management (SCM)
  61. utility software
  62. optical character recognition (OCR)
  63. circuit-switched network
  64. crisis management team
  65. hertz (Hz)
  66. enterprise architecture (EA)
  67. business process management (BPM)
  68. optical fiber
  69. object-oriented programming
  70. client-server network
  71. operating system (OS)
  72. random access memory (RAM)
  73. business process
  74. application software
  75. commercial off-the-shelf (COTS)
  76. radio frequency identification (RFID)
  77. value chain model
  78. ASCII code
  79. web beacon or web bug
  80. twisted pair wires
  81. wifi
  82. n-tier
  83. WiMax
  84. sustaining technologies
  85. digital subscriber lines (DSL)
  86. bandwidth
  87. programming language
  88. low cost leadership strategy
  89. power of suppliers
  90. virtualization
  91. operations management
  92. middleware
  93. competitive advantage
  94. talent management
  95. peer-to-peer network
  96. data-driven decision making
  97. transistor
  98. Internet Protocol Version 6 (IPv6)
  99. Web 2.0
  100. TCP/IP
  101. information and communications technology (ICT)
  102. packet switching
  103. support activities
  104. bits per second (bps)
  105. customer relationship management (CRM)
  106. wavelength
  107. threat of new entrants