wavelengthdata-drivendecisionmakingbusinessprocessenterpriseresourceplanning(ERP)enterprisearchitecture(EA)transistorglobalpositioningsystems(GPS)sustainingtechnologiesthreatof newentrantsinformationhumanresourcesmanagement(HRM)systemprogramminglanguagelocal areanetwork(LAN)radiofrequencyidentification(RFID)softwarevisibilitycompetitiveadvantageclient-servernetworkinformationsystempeer-to-peernetworklow costleadershipstrategynetworktalentmanagementelectronicdatainterchange(EDI)bullwhipeffectvirtualizationbandwidthapplicationsoftwaremicrowavetransmissionmanagementinformationsystems(MIS)object-orientedprogrammingopticalcharacterrecognition(OCR)n-tierproductdifferentiationstrategybenchmarkopticalscannersnetworkeffectsuser-generatedcontent(UGC)bits persecond(bps)InternetProtocolVersion 6(IPv6)Ethernetoperationsmanagementpacketswitchingoperatingsystem(OS)Moore'sLawsourcecodeecosystemopensourcesoftwareWiMaxvaluechainmodelsupportactivitieswirelessrouterfocusednichestrategyinformation andcommunicationstechnology (ICT)socialnetworkingsiteswifipower ofsuppliersbytelegacysystemsmiddlewaredigitalsubscriberlines(DSL)eXtensibleBusinessReportingLanguage(XBRL)randomaccessmemory(RAM)businessintelligenceASCIIcodeprimaryactivitiescircuit-switchednetworkdisruptiveinnovationcreativedestructionsystemsoftwarecrisismanagementteamstrategicenablercustomerrelationshipmanagement(CRM)financialmanagementsystemthreat ofsubstitutesTCP/IPutilitysoftwareopticalfiberpowerofbuyershertz(Hz)demandforecastaccuracy(DFA)workforcemanagementmodulecloudcomputingchiefinformationofficer(CIO)supply chainmanagement(SCM)centralprocessingunit (CPU)webbeacon orweb bugrivalryamongexistingcompetitorscustomerrelationshipmanagement(CRM)systemswitchingcostscomputere-discoverybusinessprocessmanagement(BPM)Web2.0softwareas aservice(SaaS)data-drivendecisionmakingprivatebranchexchange(PBX)coaxialcableshumancapitalmanagement(HCM)Bluetoothtwistedpairwirese-governmentsentimentanalysisinformationtechnology(IT)commercialoff-the-shelf(COTS)in-memorycomputingvoiceover IP(VoIP)wavelengthdata-drivendecisionmakingbusinessprocessenterpriseresourceplanning(ERP)enterprisearchitecture(EA)transistorglobalpositioningsystems(GPS)sustainingtechnologiesthreatof newentrantsinformationhumanresourcesmanagement(HRM)systemprogramminglanguagelocal areanetwork(LAN)radiofrequencyidentification(RFID)softwarevisibilitycompetitiveadvantageclient-servernetworkinformationsystempeer-to-peernetworklow costleadershipstrategynetworktalentmanagementelectronicdatainterchange(EDI)bullwhipeffectvirtualizationbandwidthapplicationsoftwaremicrowavetransmissionmanagementinformationsystems(MIS)object-orientedprogrammingopticalcharacterrecognition(OCR)n-tierproductdifferentiationstrategybenchmarkopticalscannersnetworkeffectsuser-generatedcontent(UGC)bits persecond(bps)InternetProtocolVersion 6(IPv6)Ethernetoperationsmanagementpacketswitchingoperatingsystem(OS)Moore'sLawsourcecodeecosystemopensourcesoftwareWiMaxvaluechainmodelsupportactivitieswirelessrouterfocusednichestrategyinformation andcommunicationstechnology (ICT)socialnetworkingsiteswifipower ofsuppliersbytelegacysystemsmiddlewaredigitalsubscriberlines(DSL)eXtensibleBusinessReportingLanguage(XBRL)randomaccessmemory(RAM)businessintelligenceASCIIcodeprimaryactivitiescircuit-switchednetworkdisruptiveinnovationcreativedestructionsystemsoftwarecrisismanagementteamstrategicenablercustomerrelationshipmanagement(CRM)financialmanagementsystemthreat ofsubstitutesTCP/IPutilitysoftwareopticalfiberpowerofbuyershertz(Hz)demandforecastaccuracy(DFA)workforcemanagementmodulecloudcomputingchiefinformationofficer(CIO)supply chainmanagement(SCM)centralprocessingunit (CPU)webbeacon orweb bugrivalryamongexistingcompetitorscustomerrelationshipmanagement(CRM)systemswitchingcostscomputere-discoverybusinessprocessmanagement(BPM)Web2.0softwareas aservice(SaaS)data-drivendecisionmakingprivatebranchexchange(PBX)coaxialcableshumancapitalmanagement(HCM)Bluetoothtwistedpairwirese-governmentsentimentanalysisinformationtechnology(IT)commercialoff-the-shelf(COTS)in-memorycomputingvoiceover IP(VoIP)

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. wavelength
  2. data-driven decision making
  3. business process
  4. enterprise resource planning (ERP)
  5. enterprise architecture (EA)
  6. transistor
  7. global positioning systems (GPS)
  8. sustaining technologies
  9. threat of new entrants
  10. information
  11. human resources management (HRM) system
  12. programming language
  13. local area network (LAN)
  14. radio frequency identification (RFID)
  15. software
  16. visibility
  17. competitive advantage
  18. client-server network
  19. information system
  20. peer-to-peer network
  21. low cost leadership strategy
  22. network
  23. talent management
  24. electronic data interchange (EDI)
  25. bullwhip effect
  26. virtualization
  27. bandwidth
  28. application software
  29. microwave transmission
  30. management information systems (MIS)
  31. object-oriented programming
  32. optical character recognition (OCR)
  33. n-tier
  34. product differentiation strategy
  35. benchmark
  36. optical scanners
  37. network effects
  38. user-generated content (UGC)
  39. bits per second (bps)
  40. Internet Protocol Version 6 (IPv6)
  41. Ethernet
  42. operations management
  43. packet switching
  44. operating system (OS)
  45. Moore's Law
  46. source code
  47. ecosystem
  48. open source software
  49. WiMax
  50. value chain model
  51. support activities
  52. wireless router
  53. focused niche strategy
  54. information and communications technology (ICT)
  55. social networking sites
  56. wifi
  57. power of suppliers
  58. byte
  59. legacy systems
  60. middleware
  61. digital subscriber lines (DSL)
  62. eXtensible Business Reporting Language (XBRL)
  63. random access memory (RAM)
  64. business intelligence
  65. ASCII code
  66. primary activities
  67. circuit-switched network
  68. disruptive innovation
  69. creative destruction
  70. system software
  71. crisis management team
  72. strategic enabler
  73. customer relationship management (CRM)
  74. financial management system
  75. threat of substitutes
  76. TCP/IP
  77. utility software
  78. optical fiber
  79. power of buyers
  80. hertz (Hz)
  81. demand forecast accuracy (DFA)
  82. workforce management module
  83. cloud computing
  84. chief information officer (CIO)
  85. supply chain management (SCM)
  86. central processing unit (CPU)
  87. web beacon or web bug
  88. rivalry among existing competitors
  89. customer relationship management (CRM) system
  90. switching costs
  91. computer
  92. e-discovery
  93. business process management (BPM)
  94. Web 2.0
  95. software as a service (SaaS)
  96. data-driven decision making
  97. private branch exchange (PBX)
  98. coaxial cables
  99. human capital management (HCM)
  100. Bluetooth
  101. twisted pair wires
  102. e-government
  103. sentiment analysis
  104. information technology (IT)
  105. commercial off-the-shelf (COTS)
  106. in-memory computing
  107. voice over IP (VoIP)