databasemanagementsoftware(DBMS)informationrecordtransistorapplicationsoftwarestructuredinformationscalabilityradiofrequencyidentification(RFID)hertz(Hz)bandwidthmicrowavetransmissionbigdatacoaxialcablesrelationaldatabasesourcecodebyteWeb2.0wirelessrouterWiMaxDatastewardbusinessprocessmanagement(BPM)businessprocessproductdifferentiationstrategyASCIIcodesemi-structuredinformationunstructuredinformationprimaryactivitiesfieldcommercialoff-the-shelf(COTS)opticalcharacterrecognition(OCR)Moore'sLawsocialnetworkingsitesthreat ofsubstitutesnetworkdigitalsubscriberlines(DSL)focusednichestrategysoftwareenterprisearchitecture(EA)disruptiveinnovationextract,transform,and load(ETL)twistedpairwiresdatabaseschemachiefinformationofficer(CIO)softwareas aservice(SaaS)wavelengthdata-drivendecisionmakingswitchingcostsuser-generatedcontent(UGC)voiceover IP(VoIP)randomaccessmemory(RAM)centralprocessingunit (CPU)valuechainmodelpacketswitchingdatadefinitionmaster datamanagementlow costleadershipstrategyautonumberingopensourcesoftwaredatamodeloperatingsystem(OS)e-governmentrivalryamongexistingcompetitorsshadowsystembits persecond(bps)data-drivendecisionmakingecosystemcircuit-switchednetworkdataminingutilitysoftwarelegacysystemscomputerforeignkeysinformation andcommunicationstechnology (ICT)datadictionarycloudcomputingcreativedestructionprivatebranchexchange(PBX)metadatan-tierlocal areanetwork(LAN)primarykeyDatawarehouseinteractivevoiceresponse(IVR)managementinformationsystems(MIS)powerofbuyersreferentialintegritybatchprocessingInternetProtocolVersion 6(IPv6)sustainingtechnologiespeer-to-peernetworkprogramminglanguagebenchmarkcompetitiveadvantageBluetooththreatof newentrantsinformationtechnology(IT)power ofsuppliersnormalizationwificrisismanagementteamEthernetopticalscannersTCP/IPe-discoverysystemsoftwareopticalfiberoperationsmanagementin-memorycomputingsupportactivitiescustomerrelationshipmanagement(CRM)systemdatabaseStructuredQueryLanguage(SQL)businessintelligencevirtualizationobject-orientedprogrammingnetworkeffectstablefunctionallydependentclient-servernetworkstrategicenablerinformationsystemdatabasemanagementsoftware(DBMS)informationrecordtransistorapplicationsoftwarestructuredinformationscalabilityradiofrequencyidentification(RFID)hertz(Hz)bandwidthmicrowavetransmissionbigdatacoaxialcablesrelationaldatabasesourcecodebyteWeb2.0wirelessrouterWiMaxDatastewardbusinessprocessmanagement(BPM)businessprocessproductdifferentiationstrategyASCIIcodesemi-structuredinformationunstructuredinformationprimaryactivitiesfieldcommercialoff-the-shelf(COTS)opticalcharacterrecognition(OCR)Moore'sLawsocialnetworkingsitesthreat ofsubstitutesnetworkdigitalsubscriberlines(DSL)focusednichestrategysoftwareenterprisearchitecture(EA)disruptiveinnovationextract,transform,and load(ETL)twistedpairwiresdatabaseschemachiefinformationofficer(CIO)softwareas aservice(SaaS)wavelengthdata-drivendecisionmakingswitchingcostsuser-generatedcontent(UGC)voiceover IP(VoIP)randomaccessmemory(RAM)centralprocessingunit (CPU)valuechainmodelpacketswitchingdatadefinitionmaster datamanagementlow costleadershipstrategyautonumberingopensourcesoftwaredatamodeloperatingsystem(OS)e-governmentrivalryamongexistingcompetitorsshadowsystembits persecond(bps)data-drivendecisionmakingecosystemcircuit-switchednetworkdataminingutilitysoftwarelegacysystemscomputerforeignkeysinformation andcommunicationstechnology (ICT)datadictionarycloudcomputingcreativedestructionprivatebranchexchange(PBX)metadatan-tierlocal areanetwork(LAN)primarykeyDatawarehouseinteractivevoiceresponse(IVR)managementinformationsystems(MIS)powerofbuyersreferentialintegritybatchprocessingInternetProtocolVersion 6(IPv6)sustainingtechnologiespeer-to-peernetworkprogramminglanguagebenchmarkcompetitiveadvantageBluetooththreatof newentrantsinformationtechnology(IT)power ofsuppliersnormalizationwificrisismanagementteamEthernetopticalscannersTCP/IPe-discoverysystemsoftwareopticalfiberoperationsmanagementin-memorycomputingsupportactivitiescustomerrelationshipmanagement(CRM)systemdatabaseStructuredQueryLanguage(SQL)businessintelligencevirtualizationobject-orientedprogrammingnetworkeffectstablefunctionallydependentclient-servernetworkstrategicenablerinformationsystem

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. database management software (DBMS)
  2. information
  3. record
  4. transistor
  5. application software
  6. structured information
  7. scalability
  8. radio frequency identification (RFID)
  9. hertz (Hz)
  10. bandwidth
  11. microwave transmission
  12. big data
  13. coaxial cables
  14. relational database
  15. source code
  16. byte
  17. Web 2.0
  18. wireless router
  19. WiMax
  20. Data steward
  21. business process management (BPM)
  22. business process
  23. product differentiation strategy
  24. ASCII code
  25. semi-structured information
  26. unstructured information
  27. primary activities
  28. field
  29. commercial off-the-shelf (COTS)
  30. optical character recognition (OCR)
  31. Moore's Law
  32. social networking sites
  33. threat of substitutes
  34. network
  35. digital subscriber lines (DSL)
  36. focused niche strategy
  37. software
  38. enterprise architecture (EA)
  39. disruptive innovation
  40. extract, transform, and load (ETL)
  41. twisted pair wires
  42. database schema
  43. chief information officer (CIO)
  44. software as a service (SaaS)
  45. wavelength
  46. data-driven decision making
  47. switching costs
  48. user-generated content (UGC)
  49. voice over IP (VoIP)
  50. random access memory (RAM)
  51. central processing unit (CPU)
  52. value chain model
  53. packet switching
  54. data definition
  55. master data management
  56. low cost leadership strategy
  57. autonumbering
  58. open source software
  59. data model
  60. operating system (OS)
  61. e-government
  62. rivalry among existing competitors
  63. shadow system
  64. bits per second (bps)
  65. data-driven decision making
  66. ecosystem
  67. circuit-switched network
  68. data mining
  69. utility software
  70. legacy systems
  71. computer
  72. foreign keys
  73. information and communications technology (ICT)
  74. data dictionary
  75. cloud computing
  76. creative destruction
  77. private branch exchange (PBX)
  78. metadata
  79. n-tier
  80. local area network (LAN)
  81. primary key
  82. Data warehouse
  83. interactive voice response (IVR)
  84. management information systems (MIS)
  85. power of buyers
  86. referential integrity
  87. batch processing
  88. Internet Protocol Version 6 (IPv6)
  89. sustaining technologies
  90. peer-to-peer network
  91. programming language
  92. benchmark
  93. competitive advantage
  94. Bluetooth
  95. threat of new entrants
  96. information technology (IT)
  97. power of suppliers
  98. normalization
  99. wifi
  100. crisis management team
  101. Ethernet
  102. optical scanners
  103. TCP/IP
  104. e-discovery
  105. system software
  106. optical fiber
  107. operations management
  108. in-memory computing
  109. support activities
  110. customer relationship management (CRM) system
  111. database
  112. Structured Query Language (SQL)
  113. business intelligence
  114. virtualization
  115. object-oriented programming
  116. network effects
  117. table
  118. functionally dependent
  119. client-server network
  120. strategic enabler
  121. information system