computerdigitalsubscriberlines(DSL)TCP/IPEthernetwirelessrouterutilitysoftwarepowerofbuyerssustainingtechnologiesn-tierbenchmarklocal areanetwork(LAN)voiceover IP(VoIP)virtualizationin-memorycomputingnormalizationstrategicenablerecosystemradiofrequencyidentification(RFID)e-discoverysocialnetworkingsitessupportactivitiesopticalscannersdatabaseprimarykeyrelationaldatabasedata-drivendecisionmakingcentralprocessingunit (CPU)datadefinitionbusinessintelligenceoperationsmanagementbusinessprocessmanagement(BPM)networkeffectsprivatebranchexchange(PBX)Datastewardopticalcharacterrecognition(OCR)ASCIIcodeprogramminglanguageinformationtechnology(IT)threatof newentrantsInternetProtocolVersion 6(IPv6)low costleadershipstrategydatabasemanagementsoftware(DBMS)managementinformationsystems(MIS)softwareas aservice(SaaS)semi-structuredinformationcircuit-switchednetworktabledatabaseschemacustomerrelationshipmanagement(CRM)systemforeignkeysvaluechainmodelinformation andcommunicationstechnology (ICT)chiefinformationofficer(CIO)DatawarehousefunctionallydependentfieldbusinessprocesssoftwaresystemsoftwarecrisismanagementteamWiMaxhertz(Hz)data-drivendecisionmakingpower ofsuppliersmetadatawifiMoore'sLawcompetitiveadvantagedatadictionaryWeb2.0disruptiveinnovationbytetwistedpairwiresbatchprocessingdatamininge-governmentcoaxialcablesbigdatascalabilitytransistorreferentialintegrityshadowsystemmaster datamanagementclient-servernetworknetworkwavelengthenterprisearchitecture(EA)randomaccessmemory(RAM)user-generatedcontent(UGC)opensourcesoftwareinformationpeer-to-peernetworkBluetoothcreativedestructionextract,transform,and load(ETL)interactivevoiceresponse(IVR)rivalryamongexistingcompetitorsinformationsystemcloudcomputingmicrowavetransmissioncommercialoff-the-shelf(COTS)object-orientedprogrammingautonumberingoperatingsystem(OS)datamodelunstructuredinformationbits persecond(bps)focusednichestrategyStructuredQueryLanguage(SQL)opticalfiberstructuredinformationbandwidthswitchingcostsrecordthreat ofsubstitutesapplicationsoftwarelegacysystemspacketswitchingsourcecodeprimaryactivitiesproductdifferentiationstrategycomputerdigitalsubscriberlines(DSL)TCP/IPEthernetwirelessrouterutilitysoftwarepowerofbuyerssustainingtechnologiesn-tierbenchmarklocal areanetwork(LAN)voiceover IP(VoIP)virtualizationin-memorycomputingnormalizationstrategicenablerecosystemradiofrequencyidentification(RFID)e-discoverysocialnetworkingsitessupportactivitiesopticalscannersdatabaseprimarykeyrelationaldatabasedata-drivendecisionmakingcentralprocessingunit (CPU)datadefinitionbusinessintelligenceoperationsmanagementbusinessprocessmanagement(BPM)networkeffectsprivatebranchexchange(PBX)Datastewardopticalcharacterrecognition(OCR)ASCIIcodeprogramminglanguageinformationtechnology(IT)threatof newentrantsInternetProtocolVersion 6(IPv6)low costleadershipstrategydatabasemanagementsoftware(DBMS)managementinformationsystems(MIS)softwareas aservice(SaaS)semi-structuredinformationcircuit-switchednetworktabledatabaseschemacustomerrelationshipmanagement(CRM)systemforeignkeysvaluechainmodelinformation andcommunicationstechnology (ICT)chiefinformationofficer(CIO)DatawarehousefunctionallydependentfieldbusinessprocesssoftwaresystemsoftwarecrisismanagementteamWiMaxhertz(Hz)data-drivendecisionmakingpower ofsuppliersmetadatawifiMoore'sLawcompetitiveadvantagedatadictionaryWeb2.0disruptiveinnovationbytetwistedpairwiresbatchprocessingdatamininge-governmentcoaxialcablesbigdatascalabilitytransistorreferentialintegrityshadowsystemmaster datamanagementclient-servernetworknetworkwavelengthenterprisearchitecture(EA)randomaccessmemory(RAM)user-generatedcontent(UGC)opensourcesoftwareinformationpeer-to-peernetworkBluetoothcreativedestructionextract,transform,and load(ETL)interactivevoiceresponse(IVR)rivalryamongexistingcompetitorsinformationsystemcloudcomputingmicrowavetransmissioncommercialoff-the-shelf(COTS)object-orientedprogrammingautonumberingoperatingsystem(OS)datamodelunstructuredinformationbits persecond(bps)focusednichestrategyStructuredQueryLanguage(SQL)opticalfiberstructuredinformationbandwidthswitchingcostsrecordthreat ofsubstitutesapplicationsoftwarelegacysystemspacketswitchingsourcecodeprimaryactivitiesproductdifferentiationstrategy

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. computer
  2. digital subscriber lines (DSL)
  3. TCP/IP
  4. Ethernet
  5. wireless router
  6. utility software
  7. power of buyers
  8. sustaining technologies
  9. n-tier
  10. benchmark
  11. local area network (LAN)
  12. voice over IP (VoIP)
  13. virtualization
  14. in-memory computing
  15. normalization
  16. strategic enabler
  17. ecosystem
  18. radio frequency identification (RFID)
  19. e-discovery
  20. social networking sites
  21. support activities
  22. optical scanners
  23. database
  24. primary key
  25. relational database
  26. data-driven decision making
  27. central processing unit (CPU)
  28. data definition
  29. business intelligence
  30. operations management
  31. business process management (BPM)
  32. network effects
  33. private branch exchange (PBX)
  34. Data steward
  35. optical character recognition (OCR)
  36. ASCII code
  37. programming language
  38. information technology (IT)
  39. threat of new entrants
  40. Internet Protocol Version 6 (IPv6)
  41. low cost leadership strategy
  42. database management software (DBMS)
  43. management information systems (MIS)
  44. software as a service (SaaS)
  45. semi-structured information
  46. circuit-switched network
  47. table
  48. database schema
  49. customer relationship management (CRM) system
  50. foreign keys
  51. value chain model
  52. information and communications technology (ICT)
  53. chief information officer (CIO)
  54. Data warehouse
  55. functionally dependent
  56. field
  57. business process
  58. software
  59. system software
  60. crisis management team
  61. WiMax
  62. hertz (Hz)
  63. data-driven decision making
  64. power of suppliers
  65. metadata
  66. wifi
  67. Moore's Law
  68. competitive advantage
  69. data dictionary
  70. Web 2.0
  71. disruptive innovation
  72. byte
  73. twisted pair wires
  74. batch processing
  75. data mining
  76. e-government
  77. coaxial cables
  78. big data
  79. scalability
  80. transistor
  81. referential integrity
  82. shadow system
  83. master data management
  84. client-server network
  85. network
  86. wavelength
  87. enterprise architecture (EA)
  88. random access memory (RAM)
  89. user-generated content (UGC)
  90. open source software
  91. information
  92. peer-to-peer network
  93. Bluetooth
  94. creative destruction
  95. extract, transform, and load (ETL)
  96. interactive voice response (IVR)
  97. rivalry among existing competitors
  98. information system
  99. cloud computing
  100. microwave transmission
  101. commercial off-the-shelf (COTS)
  102. object-oriented programming
  103. autonumbering
  104. operating system (OS)
  105. data model
  106. unstructured information
  107. bits per second (bps)
  108. focused niche strategy
  109. Structured Query Language (SQL)
  110. optical fiber
  111. structured information
  112. bandwidth
  113. switching costs
  114. record
  115. threat of substitutes
  116. application software
  117. legacy systems
  118. packet switching
  119. source code
  120. primary activities
  121. product differentiation strategy