TCP/IPsupportactivitiesopensourcesoftwareoperationsmanagementpeer-to-peernetworksustainingtechnologieshertz(Hz)threatof newentrantsenterprisearchitecture(EA)wificommercialoff-the-shelf(COTS)businessintelligencehumancapitalmanagement(HCM)bytetwistedpairwiresbullwhipeffectcentralprocessingunit (CPU)primaryactivitiessocialnetworkingsitescompetitiveadvantagecircuit-switchednetworkcustomerrelationshipmanagement(CRM)virtualizationwirelessrouterhumanresourcesmanagement(HRM)systemobject-orientedprogrammingpower ofsupplierse-discoverycrisismanagementteamASCIIcodeuser-generatedcontent(UGC)talentmanagementbenchmarkopticalscannersecosystemdigitalsubscriberlines(DSL)bandwidthstrategicenablerprogramminglanguagelow costleadershipstrategyinformationdata-drivendecisionmakingMoore'sLawinformationtechnology(IT)informationsystemvisibilitydisruptiveinnovationtransistoroperatingsystem(OS)cloudcomputinge-governmentBluetoothbusinessprocessmanagement(BPM)privatebranchexchange(PBX)in-memorycomputingfinancialmanagementsystemmicrowavetransmissionapplicationsoftwareclient-servernetworkglobalpositioningsystems(GPS)rivalryamongexistingcompetitorsdemandforecastaccuracy(DFA)sentimentanalysismiddlewarelegacysystemsthreat ofsubstitutesinformation andcommunicationstechnology (ICT)businessprocesscomputerInternetProtocolVersion 6(IPv6)networkeffectssoftwareWiMaxeXtensibleBusinessReportingLanguage(XBRL)productdifferentiationstrategycreativedestructionswitchingcostsbits persecond(bps)managementinformationsystems(MIS)electronicdatainterchange(EDI)enterpriseresourceplanning(ERP)opticalcharacterrecognition(OCR)local areanetwork(LAN)workforcemanagementmodulevoiceover IP(VoIP)focusednichestrategysystemsoftwarewebbeacon orweb bugnetworkradiofrequencyidentification(RFID)packetswitchingvaluechainmodelWeb2.0utilitysoftwareEthernetsourcecodesupply chainmanagement(SCM)powerofbuyerschiefinformationofficer(CIO)coaxialcablesdata-drivendecisionmakingsoftwareas aservice(SaaS)opticalfiberrandomaccessmemory(RAM)customerrelationshipmanagement(CRM)systemn-tierwavelengthTCP/IPsupportactivitiesopensourcesoftwareoperationsmanagementpeer-to-peernetworksustainingtechnologieshertz(Hz)threatof newentrantsenterprisearchitecture(EA)wificommercialoff-the-shelf(COTS)businessintelligencehumancapitalmanagement(HCM)bytetwistedpairwiresbullwhipeffectcentralprocessingunit (CPU)primaryactivitiessocialnetworkingsitescompetitiveadvantagecircuit-switchednetworkcustomerrelationshipmanagement(CRM)virtualizationwirelessrouterhumanresourcesmanagement(HRM)systemobject-orientedprogrammingpower ofsupplierse-discoverycrisismanagementteamASCIIcodeuser-generatedcontent(UGC)talentmanagementbenchmarkopticalscannersecosystemdigitalsubscriberlines(DSL)bandwidthstrategicenablerprogramminglanguagelow costleadershipstrategyinformationdata-drivendecisionmakingMoore'sLawinformationtechnology(IT)informationsystemvisibilitydisruptiveinnovationtransistoroperatingsystem(OS)cloudcomputinge-governmentBluetoothbusinessprocessmanagement(BPM)privatebranchexchange(PBX)in-memorycomputingfinancialmanagementsystemmicrowavetransmissionapplicationsoftwareclient-servernetworkglobalpositioningsystems(GPS)rivalryamongexistingcompetitorsdemandforecastaccuracy(DFA)sentimentanalysismiddlewarelegacysystemsthreat ofsubstitutesinformation andcommunicationstechnology (ICT)businessprocesscomputerInternetProtocolVersion 6(IPv6)networkeffectssoftwareWiMaxeXtensibleBusinessReportingLanguage(XBRL)productdifferentiationstrategycreativedestructionswitchingcostsbits persecond(bps)managementinformationsystems(MIS)electronicdatainterchange(EDI)enterpriseresourceplanning(ERP)opticalcharacterrecognition(OCR)local areanetwork(LAN)workforcemanagementmodulevoiceover IP(VoIP)focusednichestrategysystemsoftwarewebbeacon orweb bugnetworkradiofrequencyidentification(RFID)packetswitchingvaluechainmodelWeb2.0utilitysoftwareEthernetsourcecodesupply chainmanagement(SCM)powerofbuyerschiefinformationofficer(CIO)coaxialcablesdata-drivendecisionmakingsoftwareas aservice(SaaS)opticalfiberrandomaccessmemory(RAM)customerrelationshipmanagement(CRM)systemn-tierwavelength

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. TCP/IP
  2. support activities
  3. open source software
  4. operations management
  5. peer-to-peer network
  6. sustaining technologies
  7. hertz (Hz)
  8. threat of new entrants
  9. enterprise architecture (EA)
  10. wifi
  11. commercial off-the-shelf (COTS)
  12. business intelligence
  13. human capital management (HCM)
  14. byte
  15. twisted pair wires
  16. bullwhip effect
  17. central processing unit (CPU)
  18. primary activities
  19. social networking sites
  20. competitive advantage
  21. circuit-switched network
  22. customer relationship management (CRM)
  23. virtualization
  24. wireless router
  25. human resources management (HRM) system
  26. object-oriented programming
  27. power of suppliers
  28. e-discovery
  29. crisis management team
  30. ASCII code
  31. user-generated content (UGC)
  32. talent management
  33. benchmark
  34. optical scanners
  35. ecosystem
  36. digital subscriber lines (DSL)
  37. bandwidth
  38. strategic enabler
  39. programming language
  40. low cost leadership strategy
  41. information
  42. data-driven decision making
  43. Moore's Law
  44. information technology (IT)
  45. information system
  46. visibility
  47. disruptive innovation
  48. transistor
  49. operating system (OS)
  50. cloud computing
  51. e-government
  52. Bluetooth
  53. business process management (BPM)
  54. private branch exchange (PBX)
  55. in-memory computing
  56. financial management system
  57. microwave transmission
  58. application software
  59. client-server network
  60. global positioning systems (GPS)
  61. rivalry among existing competitors
  62. demand forecast accuracy (DFA)
  63. sentiment analysis
  64. middleware
  65. legacy systems
  66. threat of substitutes
  67. information and communications technology (ICT)
  68. business process
  69. computer
  70. Internet Protocol Version 6 (IPv6)
  71. network effects
  72. software
  73. WiMax
  74. eXtensible Business Reporting Language (XBRL)
  75. product differentiation strategy
  76. creative destruction
  77. switching costs
  78. bits per second (bps)
  79. management information systems (MIS)
  80. electronic data interchange (EDI)
  81. enterprise resource planning (ERP)
  82. optical character recognition (OCR)
  83. local area network (LAN)
  84. workforce management module
  85. voice over IP (VoIP)
  86. focused niche strategy
  87. system software
  88. web beacon or web bug
  89. network
  90. radio frequency identification (RFID)
  91. packet switching
  92. value chain model
  93. Web 2.0
  94. utility software
  95. Ethernet
  96. source code
  97. supply chain management (SCM)
  98. power of buyers
  99. chief information officer (CIO)
  100. coaxial cables
  101. data-driven decision making
  102. software as a service (SaaS)
  103. optical fiber
  104. random access memory (RAM)
  105. customer relationship management (CRM) system
  106. n-tier
  107. wavelength