digitalsubscriberlines(DSL)extract,transform,and load(ETL)packetswitchingnetworkeffectsclient-servernetworkobject-orientedprogrammingbusinessprocesscustomerrelationshipmanagement(CRM)systemopticalfiberWiMaxcompetitiveadvantageDatawarehouseprimaryactivitiesutilitysoftwarecreativedestructionbytefocusednichestrategymicrowavetransmissionnetworktableASCIIcodedatabaseschemapower ofsuppliersoperationsmanagementwirelessrouterdata-drivendecisionmakingBluetoothmaster datamanagementdatadefinitioninformationbits persecond(bps)interactivevoiceresponse(IVR)datamodelvaluechainmodelrecorde-governmentopensourcesoftwarereferentialintegritythreatof newentrantsrivalryamongexistingcompetitorsuser-generatedcontent(UGC)Datastewardbigdatacentralprocessingunit (CPU)randomaccessmemory(RAM)operatingsystem(OS)data-drivendecisionmakingtwistedpairwiresrelationaldatabaseradiofrequencyidentification(RFID)databasecloudcomputingfunctionallydependentEthernetlocal areanetwork(LAN)InternetProtocolVersion 6(IPv6)normalizationinformationtechnology(IT)informationsystemfieldopticalscannerssemi-structuredinformationecosysteminformation andcommunicationstechnology (ICT)primarykeye-discoverycomputercoaxialcablessoftwareas aservice(SaaS)crisismanagementteamwavelengthvirtualizationthreat ofsubstitutesMoore'sLawprogramminglanguageforeignkeyspeer-to-peernetworklegacysystemsstructuredinformationStructuredQueryLanguage(SQL)systemsoftwarepowerofbuyersshadowsystemdataminingunstructuredinformationvoiceover IP(VoIP)circuit-switchednetworkopticalcharacterrecognition(OCR)sourcecodeenterprisearchitecture(EA)n-tierbusinessprocessmanagement(BPM)privatebranchexchange(PBX)Web2.0businessintelligencemanagementinformationsystems(MIS)productdifferentiationstrategybenchmarkautonumberinglow costleadershipstrategyswitchingcostssoftwarestrategicenablerdisruptiveinnovationsustainingtechnologiesdatabasemanagementsoftware(DBMS)wifimetadatatransistorscalabilitysupportactivitiesbandwidthdatadictionaryhertz(Hz)chiefinformationofficer(CIO)in-memorycomputingsocialnetworkingsitesbatchprocessingTCP/IPcommercialoff-the-shelf(COTS)applicationsoftwaredigitalsubscriberlines(DSL)extract,transform,and load(ETL)packetswitchingnetworkeffectsclient-servernetworkobject-orientedprogrammingbusinessprocesscustomerrelationshipmanagement(CRM)systemopticalfiberWiMaxcompetitiveadvantageDatawarehouseprimaryactivitiesutilitysoftwarecreativedestructionbytefocusednichestrategymicrowavetransmissionnetworktableASCIIcodedatabaseschemapower ofsuppliersoperationsmanagementwirelessrouterdata-drivendecisionmakingBluetoothmaster datamanagementdatadefinitioninformationbits persecond(bps)interactivevoiceresponse(IVR)datamodelvaluechainmodelrecorde-governmentopensourcesoftwarereferentialintegritythreatof newentrantsrivalryamongexistingcompetitorsuser-generatedcontent(UGC)Datastewardbigdatacentralprocessingunit (CPU)randomaccessmemory(RAM)operatingsystem(OS)data-drivendecisionmakingtwistedpairwiresrelationaldatabaseradiofrequencyidentification(RFID)databasecloudcomputingfunctionallydependentEthernetlocal areanetwork(LAN)InternetProtocolVersion 6(IPv6)normalizationinformationtechnology(IT)informationsystemfieldopticalscannerssemi-structuredinformationecosysteminformation andcommunicationstechnology (ICT)primarykeye-discoverycomputercoaxialcablessoftwareas aservice(SaaS)crisismanagementteamwavelengthvirtualizationthreat ofsubstitutesMoore'sLawprogramminglanguageforeignkeyspeer-to-peernetworklegacysystemsstructuredinformationStructuredQueryLanguage(SQL)systemsoftwarepowerofbuyersshadowsystemdataminingunstructuredinformationvoiceover IP(VoIP)circuit-switchednetworkopticalcharacterrecognition(OCR)sourcecodeenterprisearchitecture(EA)n-tierbusinessprocessmanagement(BPM)privatebranchexchange(PBX)Web2.0businessintelligencemanagementinformationsystems(MIS)productdifferentiationstrategybenchmarkautonumberinglow costleadershipstrategyswitchingcostssoftwarestrategicenablerdisruptiveinnovationsustainingtechnologiesdatabasemanagementsoftware(DBMS)wifimetadatatransistorscalabilitysupportactivitiesbandwidthdatadictionaryhertz(Hz)chiefinformationofficer(CIO)in-memorycomputingsocialnetworkingsitesbatchprocessingTCP/IPcommercialoff-the-shelf(COTS)applicationsoftware

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. digital subscriber lines (DSL)
  2. extract, transform, and load (ETL)
  3. packet switching
  4. network effects
  5. client-server network
  6. object-oriented programming
  7. business process
  8. customer relationship management (CRM) system
  9. optical fiber
  10. WiMax
  11. competitive advantage
  12. Data warehouse
  13. primary activities
  14. utility software
  15. creative destruction
  16. byte
  17. focused niche strategy
  18. microwave transmission
  19. network
  20. table
  21. ASCII code
  22. database schema
  23. power of suppliers
  24. operations management
  25. wireless router
  26. data-driven decision making
  27. Bluetooth
  28. master data management
  29. data definition
  30. information
  31. bits per second (bps)
  32. interactive voice response (IVR)
  33. data model
  34. value chain model
  35. record
  36. e-government
  37. open source software
  38. referential integrity
  39. threat of new entrants
  40. rivalry among existing competitors
  41. user-generated content (UGC)
  42. Data steward
  43. big data
  44. central processing unit (CPU)
  45. random access memory (RAM)
  46. operating system (OS)
  47. data-driven decision making
  48. twisted pair wires
  49. relational database
  50. radio frequency identification (RFID)
  51. database
  52. cloud computing
  53. functionally dependent
  54. Ethernet
  55. local area network (LAN)
  56. Internet Protocol Version 6 (IPv6)
  57. normalization
  58. information technology (IT)
  59. information system
  60. field
  61. optical scanners
  62. semi-structured information
  63. ecosystem
  64. information and communications technology (ICT)
  65. primary key
  66. e-discovery
  67. computer
  68. coaxial cables
  69. software as a service (SaaS)
  70. crisis management team
  71. wavelength
  72. virtualization
  73. threat of substitutes
  74. Moore's Law
  75. programming language
  76. foreign keys
  77. peer-to-peer network
  78. legacy systems
  79. structured information
  80. Structured Query Language (SQL)
  81. system software
  82. power of buyers
  83. shadow system
  84. data mining
  85. unstructured information
  86. voice over IP (VoIP)
  87. circuit-switched network
  88. optical character recognition (OCR)
  89. source code
  90. enterprise architecture (EA)
  91. n-tier
  92. business process management (BPM)
  93. private branch exchange (PBX)
  94. Web 2.0
  95. business intelligence
  96. management information systems (MIS)
  97. product differentiation strategy
  98. benchmark
  99. autonumbering
  100. low cost leadership strategy
  101. switching costs
  102. software
  103. strategic enabler
  104. disruptive innovation
  105. sustaining technologies
  106. database management software (DBMS)
  107. wifi
  108. metadata
  109. transistor
  110. scalability
  111. support activities
  112. bandwidth
  113. data dictionary
  114. hertz (Hz)
  115. chief information officer (CIO)
  116. in-memory computing
  117. social networking sites
  118. batch processing
  119. TCP/IP
  120. commercial off-the-shelf (COTS)
  121. application software