referentialintegrityvaluechainmodelopticalscannersvirtualizationtransistorfunctionallydependentscalabilitytablepacketswitchinginformationtechnology(IT)databaseclient-servernetworkmaster datamanagementapplicationsoftwarelocal areanetwork(LAN)enterprisearchitecture(EA)opensourcesoftwareradiofrequencyidentification(RFID)randomaccessmemory(RAM)focusednichestrategysoftwareas aservice(SaaS)customerrelationshipmanagement(CRM)systempowerofbuyersstrategicenablerWeb2.0socialnetworkingsitesin-memorycomputingrelationaldatabaseDatastewarddatadefinitionbandwidthutilitysoftwareinteractivevoiceresponse(IVR)primaryactivitiessupportactivitiespeer-to-peernetworkStructuredQueryLanguage(SQL)bytedata-drivendecisionmakingthreat ofsubstitutesdatamodelcloudcomputingwirelessrouterdisruptiveinnovationvoiceover IP(VoIP)softwaremicrowavetransmissionTCP/IPnetworkeffectsproductdifferentiationstrategyInternetProtocolVersion 6(IPv6)benchmarkdata-drivendecisionmakingopticalcharacterrecognition(OCR)networkecosystemsystemsoftwareuser-generatedcontent(UGC)recordbusinessprocessASCIIcodeobject-orientedprogrammingcommercialoff-the-shelf(COTS)wifioperatingsystem(OS)Datawarehouseinformation andcommunicationstechnology (ICT)businessintelligencelegacysystemse-discoveryprivatebranchexchange(PBX)creativedestructionunstructuredinformationshadowsystemoperationsmanagementcircuit-switchednetworkautonumberingprimarykeycrisismanagementteambits persecond(bps)Moore'sLawdigitalsubscriberlines(DSL)fieldprogramminglanguagesourcecoderivalryamongexistingcompetitorsforeignkeysbatchprocessingtwistedpairwirespower ofsupplierscentralprocessingunit (CPU)bigdatastructuredinformationinformationsystemthreatof newentrantshertz(Hz)databasemanagementsoftware(DBMS)WiMaxcomputern-tierbusinessprocessmanagement(BPM)normalizationmanagementinformationsystems(MIS)metadatadatadictionaryBluetoothwavelengthswitchingcostscompetitiveadvantagecoaxialcableslow costleadershipstrategysustainingtechnologiesopticalfiberchiefinformationofficer(CIO)extract,transform,and load(ETL)e-governmentdatabaseschemainformationsemi-structuredinformationdataminingEthernetreferentialintegrityvaluechainmodelopticalscannersvirtualizationtransistorfunctionallydependentscalabilitytablepacketswitchinginformationtechnology(IT)databaseclient-servernetworkmaster datamanagementapplicationsoftwarelocal areanetwork(LAN)enterprisearchitecture(EA)opensourcesoftwareradiofrequencyidentification(RFID)randomaccessmemory(RAM)focusednichestrategysoftwareas aservice(SaaS)customerrelationshipmanagement(CRM)systempowerofbuyersstrategicenablerWeb2.0socialnetworkingsitesin-memorycomputingrelationaldatabaseDatastewarddatadefinitionbandwidthutilitysoftwareinteractivevoiceresponse(IVR)primaryactivitiessupportactivitiespeer-to-peernetworkStructuredQueryLanguage(SQL)bytedata-drivendecisionmakingthreat ofsubstitutesdatamodelcloudcomputingwirelessrouterdisruptiveinnovationvoiceover IP(VoIP)softwaremicrowavetransmissionTCP/IPnetworkeffectsproductdifferentiationstrategyInternetProtocolVersion 6(IPv6)benchmarkdata-drivendecisionmakingopticalcharacterrecognition(OCR)networkecosystemsystemsoftwareuser-generatedcontent(UGC)recordbusinessprocessASCIIcodeobject-orientedprogrammingcommercialoff-the-shelf(COTS)wifioperatingsystem(OS)Datawarehouseinformation andcommunicationstechnology (ICT)businessintelligencelegacysystemse-discoveryprivatebranchexchange(PBX)creativedestructionunstructuredinformationshadowsystemoperationsmanagementcircuit-switchednetworkautonumberingprimarykeycrisismanagementteambits persecond(bps)Moore'sLawdigitalsubscriberlines(DSL)fieldprogramminglanguagesourcecoderivalryamongexistingcompetitorsforeignkeysbatchprocessingtwistedpairwirespower ofsupplierscentralprocessingunit (CPU)bigdatastructuredinformationinformationsystemthreatof newentrantshertz(Hz)databasemanagementsoftware(DBMS)WiMaxcomputern-tierbusinessprocessmanagement(BPM)normalizationmanagementinformationsystems(MIS)metadatadatadictionaryBluetoothwavelengthswitchingcostscompetitiveadvantagecoaxialcableslow costleadershipstrategysustainingtechnologiesopticalfiberchiefinformationofficer(CIO)extract,transform,and load(ETL)e-governmentdatabaseschemainformationsemi-structuredinformationdataminingEthernet

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. referential integrity
  2. value chain model
  3. optical scanners
  4. virtualization
  5. transistor
  6. functionally dependent
  7. scalability
  8. table
  9. packet switching
  10. information technology (IT)
  11. database
  12. client-server network
  13. master data management
  14. application software
  15. local area network (LAN)
  16. enterprise architecture (EA)
  17. open source software
  18. radio frequency identification (RFID)
  19. random access memory (RAM)
  20. focused niche strategy
  21. software as a service (SaaS)
  22. customer relationship management (CRM) system
  23. power of buyers
  24. strategic enabler
  25. Web 2.0
  26. social networking sites
  27. in-memory computing
  28. relational database
  29. Data steward
  30. data definition
  31. bandwidth
  32. utility software
  33. interactive voice response (IVR)
  34. primary activities
  35. support activities
  36. peer-to-peer network
  37. Structured Query Language (SQL)
  38. byte
  39. data-driven decision making
  40. threat of substitutes
  41. data model
  42. cloud computing
  43. wireless router
  44. disruptive innovation
  45. voice over IP (VoIP)
  46. software
  47. microwave transmission
  48. TCP/IP
  49. network effects
  50. product differentiation strategy
  51. Internet Protocol Version 6 (IPv6)
  52. benchmark
  53. data-driven decision making
  54. optical character recognition (OCR)
  55. network
  56. ecosystem
  57. system software
  58. user-generated content (UGC)
  59. record
  60. business process
  61. ASCII code
  62. object-oriented programming
  63. commercial off-the-shelf (COTS)
  64. wifi
  65. operating system (OS)
  66. Data warehouse
  67. information and communications technology (ICT)
  68. business intelligence
  69. legacy systems
  70. e-discovery
  71. private branch exchange (PBX)
  72. creative destruction
  73. unstructured information
  74. shadow system
  75. operations management
  76. circuit-switched network
  77. autonumbering
  78. primary key
  79. crisis management team
  80. bits per second (bps)
  81. Moore's Law
  82. digital subscriber lines (DSL)
  83. field
  84. programming language
  85. source code
  86. rivalry among existing competitors
  87. foreign keys
  88. batch processing
  89. twisted pair wires
  90. power of suppliers
  91. central processing unit (CPU)
  92. big data
  93. structured information
  94. information system
  95. threat of new entrants
  96. hertz (Hz)
  97. database management software (DBMS)
  98. WiMax
  99. computer
  100. n-tier
  101. business process management (BPM)
  102. normalization
  103. management information systems (MIS)
  104. metadata
  105. data dictionary
  106. Bluetooth
  107. wavelength
  108. switching costs
  109. competitive advantage
  110. coaxial cables
  111. low cost leadership strategy
  112. sustaining technologies
  113. optical fiber
  114. chief information officer (CIO)
  115. extract, transform, and load (ETL)
  116. e-government
  117. database schema
  118. information
  119. semi-structured information
  120. data mining
  121. Ethernet