packetswitchingMoore'sLawfinancialmanagementsystemthreat ofsubstitutesvisibilitysystemsoftwareworkforcemanagementmodulecoaxialcablesASCIIcodeopticalfiberbullwhipeffectvoiceover IP(VoIP)computerbusinessprocesslow costleadershipstrategyn-tieropticalscannersopensourcesoftwaresoftwareas aservice(SaaS)cloudcomputingclient-servernetworkin-memorycomputingcompetitiveadvantagethreatof newentrantsopticalcharacterrecognition(OCR)bandwidthhumancapitalmanagement(HCM)microwavetransmissioninformationsysteminformation andcommunicationstechnology (ICT)networkeffectstwistedpairwiresInternetProtocolVersion 6(IPv6)humanresourcesmanagement(HRM)systemecosystemapplicationsoftwareswitchingcostsvaluechainmodelcommercialoff-the-shelf(COTS)globalpositioningsystems(GPS)e-governmentlocal areanetwork(LAN)middlewareprimaryactivitiesenterpriseresourceplanning(ERP)softwarestrategicenablerEthernetsupply chainmanagement(SCM)talentmanagementdata-drivendecisionmakingsupportactivitiesdisruptiveinnovationsustainingtechnologiesfocusednichestrategyuser-generatedcontent(UGC)bits persecond(bps)wirelessrouterWiMaxbusinessintelligencecentralprocessingunit (CPU)bytepower ofsuppliersutilitysoftwarewebbeacon orweb bugsocialnetworkingsitespowerofbuyersrandomaccessmemory(RAM)operatingsystem(OS)legacysystemschiefinformationofficer(CIO)crisismanagementteamdigitalsubscriberlines(DSL)TCP/IPe-discoverycreativedestructionbenchmarkwifiBluetoothvirtualizationdemandforecastaccuracy(DFA)sentimentanalysisdata-drivendecisionmakingeXtensibleBusinessReportingLanguage(XBRL)rivalryamongexistingcompetitorshertz(Hz)informationtransistorpeer-to-peernetworkobject-orientedprogrammingprivatebranchexchange(PBX)radiofrequencyidentification(RFID)sourcecodewavelengthnetworkproductdifferentiationstrategyelectronicdatainterchange(EDI)customerrelationshipmanagement(CRM)systementerprisearchitecture(EA)operationsmanagementmanagementinformationsystems(MIS)programminglanguagecustomerrelationshipmanagement(CRM)circuit-switchednetworkbusinessprocessmanagement(BPM)informationtechnology(IT)Web2.0packetswitchingMoore'sLawfinancialmanagementsystemthreat ofsubstitutesvisibilitysystemsoftwareworkforcemanagementmodulecoaxialcablesASCIIcodeopticalfiberbullwhipeffectvoiceover IP(VoIP)computerbusinessprocesslow costleadershipstrategyn-tieropticalscannersopensourcesoftwaresoftwareas aservice(SaaS)cloudcomputingclient-servernetworkin-memorycomputingcompetitiveadvantagethreatof newentrantsopticalcharacterrecognition(OCR)bandwidthhumancapitalmanagement(HCM)microwavetransmissioninformationsysteminformation andcommunicationstechnology (ICT)networkeffectstwistedpairwiresInternetProtocolVersion 6(IPv6)humanresourcesmanagement(HRM)systemecosystemapplicationsoftwareswitchingcostsvaluechainmodelcommercialoff-the-shelf(COTS)globalpositioningsystems(GPS)e-governmentlocal areanetwork(LAN)middlewareprimaryactivitiesenterpriseresourceplanning(ERP)softwarestrategicenablerEthernetsupply chainmanagement(SCM)talentmanagementdata-drivendecisionmakingsupportactivitiesdisruptiveinnovationsustainingtechnologiesfocusednichestrategyuser-generatedcontent(UGC)bits persecond(bps)wirelessrouterWiMaxbusinessintelligencecentralprocessingunit (CPU)bytepower ofsuppliersutilitysoftwarewebbeacon orweb bugsocialnetworkingsitespowerofbuyersrandomaccessmemory(RAM)operatingsystem(OS)legacysystemschiefinformationofficer(CIO)crisismanagementteamdigitalsubscriberlines(DSL)TCP/IPe-discoverycreativedestructionbenchmarkwifiBluetoothvirtualizationdemandforecastaccuracy(DFA)sentimentanalysisdata-drivendecisionmakingeXtensibleBusinessReportingLanguage(XBRL)rivalryamongexistingcompetitorshertz(Hz)informationtransistorpeer-to-peernetworkobject-orientedprogrammingprivatebranchexchange(PBX)radiofrequencyidentification(RFID)sourcecodewavelengthnetworkproductdifferentiationstrategyelectronicdatainterchange(EDI)customerrelationshipmanagement(CRM)systementerprisearchitecture(EA)operationsmanagementmanagementinformationsystems(MIS)programminglanguagecustomerrelationshipmanagement(CRM)circuit-switchednetworkbusinessprocessmanagement(BPM)informationtechnology(IT)Web2.0

GE202 Chapter 1, 2, 3 & 5 v1 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  1. packet switching
  2. Moore's Law
  3. financial management system
  4. threat of substitutes
  5. visibility
  6. system software
  7. workforce management module
  8. coaxial cables
  9. ASCII code
  10. optical fiber
  11. bullwhip effect
  12. voice over IP (VoIP)
  13. computer
  14. business process
  15. low cost leadership strategy
  16. n-tier
  17. optical scanners
  18. open source software
  19. software as a service (SaaS)
  20. cloud computing
  21. client-server network
  22. in-memory computing
  23. competitive advantage
  24. threat of new entrants
  25. optical character recognition (OCR)
  26. bandwidth
  27. human capital management (HCM)
  28. microwave transmission
  29. information system
  30. information and communications technology (ICT)
  31. network effects
  32. twisted pair wires
  33. Internet Protocol Version 6 (IPv6)
  34. human resources management (HRM) system
  35. ecosystem
  36. application software
  37. switching costs
  38. value chain model
  39. commercial off-the-shelf (COTS)
  40. global positioning systems (GPS)
  41. e-government
  42. local area network (LAN)
  43. middleware
  44. primary activities
  45. enterprise resource planning (ERP)
  46. software
  47. strategic enabler
  48. Ethernet
  49. supply chain management (SCM)
  50. talent management
  51. data-driven decision making
  52. support activities
  53. disruptive innovation
  54. sustaining technologies
  55. focused niche strategy
  56. user-generated content (UGC)
  57. bits per second (bps)
  58. wireless router
  59. WiMax
  60. business intelligence
  61. central processing unit (CPU)
  62. byte
  63. power of suppliers
  64. utility software
  65. web beacon or web bug
  66. social networking sites
  67. power of buyers
  68. random access memory (RAM)
  69. operating system (OS)
  70. legacy systems
  71. chief information officer (CIO)
  72. crisis management team
  73. digital subscriber lines (DSL)
  74. TCP/IP
  75. e-discovery
  76. creative destruction
  77. benchmark
  78. wifi
  79. Bluetooth
  80. virtualization
  81. demand forecast accuracy (DFA)
  82. sentiment analysis
  83. data-driven decision making
  84. eXtensible Business Reporting Language (XBRL)
  85. rivalry among existing competitors
  86. hertz (Hz)
  87. information
  88. transistor
  89. peer-to-peer network
  90. object-oriented programming
  91. private branch exchange (PBX)
  92. radio frequency identification (RFID)
  93. source code
  94. wavelength
  95. network
  96. product differentiation strategy
  97. electronic data interchange (EDI)
  98. customer relationship management (CRM) system
  99. enterprise architecture (EA)
  100. operations management
  101. management information systems (MIS)
  102. programming language
  103. customer relationship management (CRM)
  104. circuit-switched network
  105. business process management (BPM)
  106. information technology (IT)
  107. Web 2.0