hertz(Hz)informationin-memorycomputingeXtensibleBusinessReportingLanguage(XBRL)power ofsupplierscustomerrelationshipmanagement(CRM)systemmiddlewarecoaxialcablesbits persecond(bps)crisismanagementteamtransistorthreatof newentrantsvirtualizationwirelessrouterstrategicenablerTCP/IPinformationsystemcomputerenterprisearchitecture(EA)bytebandwidthdemandforecastaccuracy(DFA)wifibusinessintelligenceelectronicdatainterchange(EDI)wavelengthvaluechainmodelobject-orientedprogrammingutilitysoftwaree-governmentuser-generatedcontent(UGC)twistedpairwiresdata-drivendecisionmakingbullwhipeffectnetworkclient-servernetworkhumancapitalmanagement(HCM)supply chainmanagement(SCM)sustainingtechnologiesopticalcharacterrecognition(OCR)disruptiveinnovationpowerofbuyerscompetitiveadvantageEthernetopticalscannerssupportactivitiesprivatebranchexchange(PBX)applicationsoftwareoperatingsystem(OS)e-discoveryn-tierradiofrequencyidentification(RFID)ecosystempeer-to-peernetworkhumanresourcesmanagement(HRM)systemproductdifferentiationstrategyworkforcemanagementmoduleprogramminglanguagesourcecodecloudcomputingWeb2.0networkeffectswebbeacon orweb bugMoore'sLawvisibilitycommercialoff-the-shelf(COTS)opensourcesoftwaresocialnetworkingsitesdata-drivendecisionmakingoperationsmanagementprimaryactivitiesswitchingcostsvoiceover IP(VoIP)microwavetransmissionlegacysystemsenterpriseresourceplanning(ERP)information andcommunicationstechnology (ICT)businessprocessmanagement(BPM)financialmanagementsystemmanagementinformationsystems(MIS)opticalfiberdigitalsubscriberlines(DSL)chiefinformationofficer(CIO)businessprocesssentimentanalysisInternetProtocolVersion 6(IPv6)local areanetwork(LAN)randomaccessmemory(RAM)customerrelationshipmanagement(CRM)rivalryamongexistingcompetitorstalentmanagementfocusednichestrategysoftwareas aservice(SaaS)packetswitchingthreat ofsubstitutescircuit-switchednetworkcreativedestructionglobalpositioningsystems(GPS)informationtechnology(IT)centralprocessingunit (CPU)systemsoftwareBluetoothASCIIcodesoftwarelow costleadershipstrategybenchmarkWiMaxhertz(Hz)informationin-memorycomputingeXtensibleBusinessReportingLanguage(XBRL)power ofsupplierscustomerrelationshipmanagement(CRM)systemmiddlewarecoaxialcablesbits persecond(bps)crisismanagementteamtransistorthreatof newentrantsvirtualizationwirelessrouterstrategicenablerTCP/IPinformationsystemcomputerenterprisearchitecture(EA)bytebandwidthdemandforecastaccuracy(DFA)wifibusinessintelligenceelectronicdatainterchange(EDI)wavelengthvaluechainmodelobject-orientedprogrammingutilitysoftwaree-governmentuser-generatedcontent(UGC)twistedpairwiresdata-drivendecisionmakingbullwhipeffectnetworkclient-servernetworkhumancapitalmanagement(HCM)supply chainmanagement(SCM)sustainingtechnologiesopticalcharacterrecognition(OCR)disruptiveinnovationpowerofbuyerscompetitiveadvantageEthernetopticalscannerssupportactivitiesprivatebranchexchange(PBX)applicationsoftwareoperatingsystem(OS)e-discoveryn-tierradiofrequencyidentification(RFID)ecosystempeer-to-peernetworkhumanresourcesmanagement(HRM)systemproductdifferentiationstrategyworkforcemanagementmoduleprogramminglanguagesourcecodecloudcomputingWeb2.0networkeffectswebbeacon orweb bugMoore'sLawvisibilitycommercialoff-the-shelf(COTS)opensourcesoftwaresocialnetworkingsitesdata-drivendecisionmakingoperationsmanagementprimaryactivitiesswitchingcostsvoiceover IP(VoIP)microwavetransmissionlegacysystemsenterpriseresourceplanning(ERP)information andcommunicationstechnology (ICT)businessprocessmanagement(BPM)financialmanagementsystemmanagementinformationsystems(MIS)opticalfiberdigitalsubscriberlines(DSL)chiefinformationofficer(CIO)businessprocesssentimentanalysisInternetProtocolVersion 6(IPv6)local areanetwork(LAN)randomaccessmemory(RAM)customerrelationshipmanagement(CRM)rivalryamongexistingcompetitorstalentmanagementfocusednichestrategysoftwareas aservice(SaaS)packetswitchingthreat ofsubstitutescircuit-switchednetworkcreativedestructionglobalpositioningsystems(GPS)informationtechnology(IT)centralprocessingunit (CPU)systemsoftwareBluetoothASCIIcodesoftwarelow costleadershipstrategybenchmarkWiMax

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. hertz (Hz)
  2. information
  3. in-memory computing
  4. eXtensible Business Reporting Language (XBRL)
  5. power of suppliers
  6. customer relationship management (CRM) system
  7. middleware
  8. coaxial cables
  9. bits per second (bps)
  10. crisis management team
  11. transistor
  12. threat of new entrants
  13. virtualization
  14. wireless router
  15. strategic enabler
  16. TCP/IP
  17. information system
  18. computer
  19. enterprise architecture (EA)
  20. byte
  21. bandwidth
  22. demand forecast accuracy (DFA)
  23. wifi
  24. business intelligence
  25. electronic data interchange (EDI)
  26. wavelength
  27. value chain model
  28. object-oriented programming
  29. utility software
  30. e-government
  31. user-generated content (UGC)
  32. twisted pair wires
  33. data-driven decision making
  34. bullwhip effect
  35. network
  36. client-server network
  37. human capital management (HCM)
  38. supply chain management (SCM)
  39. sustaining technologies
  40. optical character recognition (OCR)
  41. disruptive innovation
  42. power of buyers
  43. competitive advantage
  44. Ethernet
  45. optical scanners
  46. support activities
  47. private branch exchange (PBX)
  48. application software
  49. operating system (OS)
  50. e-discovery
  51. n-tier
  52. radio frequency identification (RFID)
  53. ecosystem
  54. peer-to-peer network
  55. human resources management (HRM) system
  56. product differentiation strategy
  57. workforce management module
  58. programming language
  59. source code
  60. cloud computing
  61. Web 2.0
  62. network effects
  63. web beacon or web bug
  64. Moore's Law
  65. visibility
  66. commercial off-the-shelf (COTS)
  67. open source software
  68. social networking sites
  69. data-driven decision making
  70. operations management
  71. primary activities
  72. switching costs
  73. voice over IP (VoIP)
  74. microwave transmission
  75. legacy systems
  76. enterprise resource planning (ERP)
  77. information and communications technology (ICT)
  78. business process management (BPM)
  79. financial management system
  80. management information systems (MIS)
  81. optical fiber
  82. digital subscriber lines (DSL)
  83. chief information officer (CIO)
  84. business process
  85. sentiment analysis
  86. Internet Protocol Version 6 (IPv6)
  87. local area network (LAN)
  88. random access memory (RAM)
  89. customer relationship management (CRM)
  90. rivalry among existing competitors
  91. talent management
  92. focused niche strategy
  93. software as a service (SaaS)
  94. packet switching
  95. threat of substitutes
  96. circuit-switched network
  97. creative destruction
  98. global positioning systems (GPS)
  99. information technology (IT)
  100. central processing unit (CPU)
  101. system software
  102. Bluetooth
  103. ASCII code
  104. software
  105. low cost leadership strategy
  106. benchmark
  107. WiMax