coaxialcablesclient-servernetworkrandomaccessmemory(RAM)informationtechnology(IT)ASCIIcodepeer-to-peernetworktransistoroperationsmanagementopticalscannersmanagementinformationsystems(MIS)bullwhipeffectWiMaxcomputerTCP/IPstrategicenablerinformationobject-orientedprogrammingcustomerrelationshipmanagement(CRM)electronicdatainterchange(EDI)enterpriseresourceplanning(ERP)softwarelocal areanetwork(LAN)disruptiveinnovationsentimentanalysiscloudcomputinginformation andcommunicationstechnology (ICT)chiefinformationofficer(CIO)radiofrequencyidentification(RFID)hertz(Hz)primaryactivitiesnetworkeffectsapplicationsoftwarevaluechainmodelcircuit-switchednetworkpower ofsuppliersglobalpositioningsystems(GPS)data-drivendecisionmakingrivalryamongexistingcompetitorsbandwidthfinancialmanagementsystemtwistedpairwiresvisibilityEthernetnetworksystemsoftwareenterprisearchitecture(EA)user-generatedcontent(UGC)Bluetoothcrisismanagementteamdemandforecastaccuracy(DFA)wirelessrouterwebbeacon orweb bugin-memorycomputingsourcecodesoftwareas aservice(SaaS)low costleadershipstrategysupply chainmanagement(SCM)microwavetransmissionsupportactivitieslegacysystemsoperatingsystem(OS)threat ofsubstituteswavelengthworkforcemanagementmodulecreativedestructionsocialnetworkingsitesinformationsystemopticalcharacterrecognition(OCR)InternetProtocolVersion 6(IPv6)programminglanguagebusinessintelligencebytebusinessprocessmanagement(BPM)powerofbuyerscentralprocessingunit (CPU)opensourcesoftwareutilitysoftwaree-governmenthumancapitalmanagement(HCM)digitalsubscriberlines(DSL)n-tiercommercialoff-the-shelf(COTS)humanresourcesmanagement(HRM)systembenchmarkWeb2.0middlewarethreatof newentrantstalentmanagementMoore'sLawe-discoverybits persecond(bps)focusednichestrategyproductdifferentiationstrategypacketswitchingprivatebranchexchange(PBX)customerrelationshipmanagement(CRM)systemcompetitiveadvantageeXtensibleBusinessReportingLanguage(XBRL)opticalfiberwifiecosystemvoiceover IP(VoIP)sustainingtechnologiesswitchingcostsbusinessprocessdata-drivendecisionmakingvirtualizationcoaxialcablesclient-servernetworkrandomaccessmemory(RAM)informationtechnology(IT)ASCIIcodepeer-to-peernetworktransistoroperationsmanagementopticalscannersmanagementinformationsystems(MIS)bullwhipeffectWiMaxcomputerTCP/IPstrategicenablerinformationobject-orientedprogrammingcustomerrelationshipmanagement(CRM)electronicdatainterchange(EDI)enterpriseresourceplanning(ERP)softwarelocal areanetwork(LAN)disruptiveinnovationsentimentanalysiscloudcomputinginformation andcommunicationstechnology (ICT)chiefinformationofficer(CIO)radiofrequencyidentification(RFID)hertz(Hz)primaryactivitiesnetworkeffectsapplicationsoftwarevaluechainmodelcircuit-switchednetworkpower ofsuppliersglobalpositioningsystems(GPS)data-drivendecisionmakingrivalryamongexistingcompetitorsbandwidthfinancialmanagementsystemtwistedpairwiresvisibilityEthernetnetworksystemsoftwareenterprisearchitecture(EA)user-generatedcontent(UGC)Bluetoothcrisismanagementteamdemandforecastaccuracy(DFA)wirelessrouterwebbeacon orweb bugin-memorycomputingsourcecodesoftwareas aservice(SaaS)low costleadershipstrategysupply chainmanagement(SCM)microwavetransmissionsupportactivitieslegacysystemsoperatingsystem(OS)threat ofsubstituteswavelengthworkforcemanagementmodulecreativedestructionsocialnetworkingsitesinformationsystemopticalcharacterrecognition(OCR)InternetProtocolVersion 6(IPv6)programminglanguagebusinessintelligencebytebusinessprocessmanagement(BPM)powerofbuyerscentralprocessingunit (CPU)opensourcesoftwareutilitysoftwaree-governmenthumancapitalmanagement(HCM)digitalsubscriberlines(DSL)n-tiercommercialoff-the-shelf(COTS)humanresourcesmanagement(HRM)systembenchmarkWeb2.0middlewarethreatof newentrantstalentmanagementMoore'sLawe-discoverybits persecond(bps)focusednichestrategyproductdifferentiationstrategypacketswitchingprivatebranchexchange(PBX)customerrelationshipmanagement(CRM)systemcompetitiveadvantageeXtensibleBusinessReportingLanguage(XBRL)opticalfiberwifiecosystemvoiceover IP(VoIP)sustainingtechnologiesswitchingcostsbusinessprocessdata-drivendecisionmakingvirtualization

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. coaxial cables
  2. client-server network
  3. random access memory (RAM)
  4. information technology (IT)
  5. ASCII code
  6. peer-to-peer network
  7. transistor
  8. operations management
  9. optical scanners
  10. management information systems (MIS)
  11. bullwhip effect
  12. WiMax
  13. computer
  14. TCP/IP
  15. strategic enabler
  16. information
  17. object-oriented programming
  18. customer relationship management (CRM)
  19. electronic data interchange (EDI)
  20. enterprise resource planning (ERP)
  21. software
  22. local area network (LAN)
  23. disruptive innovation
  24. sentiment analysis
  25. cloud computing
  26. information and communications technology (ICT)
  27. chief information officer (CIO)
  28. radio frequency identification (RFID)
  29. hertz (Hz)
  30. primary activities
  31. network effects
  32. application software
  33. value chain model
  34. circuit-switched network
  35. power of suppliers
  36. global positioning systems (GPS)
  37. data-driven decision making
  38. rivalry among existing competitors
  39. bandwidth
  40. financial management system
  41. twisted pair wires
  42. visibility
  43. Ethernet
  44. network
  45. system software
  46. enterprise architecture (EA)
  47. user-generated content (UGC)
  48. Bluetooth
  49. crisis management team
  50. demand forecast accuracy (DFA)
  51. wireless router
  52. web beacon or web bug
  53. in-memory computing
  54. source code
  55. software as a service (SaaS)
  56. low cost leadership strategy
  57. supply chain management (SCM)
  58. microwave transmission
  59. support activities
  60. legacy systems
  61. operating system (OS)
  62. threat of substitutes
  63. wavelength
  64. workforce management module
  65. creative destruction
  66. social networking sites
  67. information system
  68. optical character recognition (OCR)
  69. Internet Protocol Version 6 (IPv6)
  70. programming language
  71. business intelligence
  72. byte
  73. business process management (BPM)
  74. power of buyers
  75. central processing unit (CPU)
  76. open source software
  77. utility software
  78. e-government
  79. human capital management (HCM)
  80. digital subscriber lines (DSL)
  81. n-tier
  82. commercial off-the-shelf (COTS)
  83. human resources management (HRM) system
  84. benchmark
  85. Web 2.0
  86. middleware
  87. threat of new entrants
  88. talent management
  89. Moore's Law
  90. e-discovery
  91. bits per second (bps)
  92. focused niche strategy
  93. product differentiation strategy
  94. packet switching
  95. private branch exchange (PBX)
  96. customer relationship management (CRM) system
  97. competitive advantage
  98. eXtensible Business Reporting Language (XBRL)
  99. optical fiber
  100. wifi
  101. ecosystem
  102. voice over IP (VoIP)
  103. sustaining technologies
  104. switching costs
  105. business process
  106. data-driven decision making
  107. virtualization