data-drivendecisionmakingpeer-to-peernetworkEthernetsustainingtechnologiesinformationbusinessprocessmanagement(BPM)cloudcomputingtwistedpairwiresproductdifferentiationstrategydatabaseschemastructuredinformationmanagementinformationsystems(MIS)shadowsystemdatadefinitionsystemsoftwareStructuredQueryLanguage(SQL)power ofsuppliersdigitalsubscriberlines(DSL)supportactivitiessoftwarehertz(Hz)bandwidthvoiceover IP(VoIP)networkdataminingprimaryactivitiesn-tiercomputermetadatamicrowavetransmissionsemi-structuredinformationwirelessrouterDatawarehouseDatastewardTCP/IPstrategicenablerobject-orientedprogrammingbusinessprocessenterprisearchitecture(EA)switchingcostsforeignkeysfocusednichestrategyvirtualizationcentralprocessingunit (CPU)socialnetworkingsitesoperationsmanagementutilitysoftwaredatabasemanagementsoftware(DBMS)bits persecond(bps)rivalryamongexistingcompetitorsopticalfibercustomerrelationshipmanagement(CRM)systemdatabasescalabilityprivatebranchexchange(PBX)powerofbuyersuser-generatedcontent(UGC)master datamanagementprimarykeycircuit-switchednetworke-discoverybyteWiMaxbigdatacompetitiveadvantagetablenetworkeffectschiefinformationofficer(CIO)Moore'sLawBluetoothunstructuredinformationreferentialintegrityfunctionallydependentlocal areanetwork(LAN)valuechainmodelinformation andcommunicationstechnology (ICT)coaxialcableswavelengthin-memorycomputingextract,transform,and load(ETL)informationtechnology(IT)data-drivendecisionmakingcrisismanagementteamfieldclient-servernetworkdatamodelcreativedestructioncommercialoff-the-shelf(COTS)softwareas aservice(SaaS)threat ofsubstitutesautonumberingopticalscannersradiofrequencyidentification(RFID)ecosystemwifibenchmarkdatadictionarybatchprocessingbusinessintelligenceopensourcesoftwaredisruptiveinnovationrecordpacketswitchinginteractivevoiceresponse(IVR)programminglanguageapplicationsoftwarerandomaccessmemory(RAM)legacysystemsASCIIcodeinformationsystemtransistorInternetProtocolVersion 6(IPv6)operatingsystem(OS)low costleadershipstrategynormalizationWeb2.0threatof newentrantse-governmentopticalcharacterrecognition(OCR)relationaldatabasesourcecodedata-drivendecisionmakingpeer-to-peernetworkEthernetsustainingtechnologiesinformationbusinessprocessmanagement(BPM)cloudcomputingtwistedpairwiresproductdifferentiationstrategydatabaseschemastructuredinformationmanagementinformationsystems(MIS)shadowsystemdatadefinitionsystemsoftwareStructuredQueryLanguage(SQL)power ofsuppliersdigitalsubscriberlines(DSL)supportactivitiessoftwarehertz(Hz)bandwidthvoiceover IP(VoIP)networkdataminingprimaryactivitiesn-tiercomputermetadatamicrowavetransmissionsemi-structuredinformationwirelessrouterDatawarehouseDatastewardTCP/IPstrategicenablerobject-orientedprogrammingbusinessprocessenterprisearchitecture(EA)switchingcostsforeignkeysfocusednichestrategyvirtualizationcentralprocessingunit (CPU)socialnetworkingsitesoperationsmanagementutilitysoftwaredatabasemanagementsoftware(DBMS)bits persecond(bps)rivalryamongexistingcompetitorsopticalfibercustomerrelationshipmanagement(CRM)systemdatabasescalabilityprivatebranchexchange(PBX)powerofbuyersuser-generatedcontent(UGC)master datamanagementprimarykeycircuit-switchednetworke-discoverybyteWiMaxbigdatacompetitiveadvantagetablenetworkeffectschiefinformationofficer(CIO)Moore'sLawBluetoothunstructuredinformationreferentialintegrityfunctionallydependentlocal areanetwork(LAN)valuechainmodelinformation andcommunicationstechnology (ICT)coaxialcableswavelengthin-memorycomputingextract,transform,and load(ETL)informationtechnology(IT)data-drivendecisionmakingcrisismanagementteamfieldclient-servernetworkdatamodelcreativedestructioncommercialoff-the-shelf(COTS)softwareas aservice(SaaS)threat ofsubstitutesautonumberingopticalscannersradiofrequencyidentification(RFID)ecosystemwifibenchmarkdatadictionarybatchprocessingbusinessintelligenceopensourcesoftwaredisruptiveinnovationrecordpacketswitchinginteractivevoiceresponse(IVR)programminglanguageapplicationsoftwarerandomaccessmemory(RAM)legacysystemsASCIIcodeinformationsystemtransistorInternetProtocolVersion 6(IPv6)operatingsystem(OS)low costleadershipstrategynormalizationWeb2.0threatof newentrantse-governmentopticalcharacterrecognition(OCR)relationaldatabasesourcecode

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. data-driven decision making
  2. peer-to-peer network
  3. Ethernet
  4. sustaining technologies
  5. information
  6. business process management (BPM)
  7. cloud computing
  8. twisted pair wires
  9. product differentiation strategy
  10. database schema
  11. structured information
  12. management information systems (MIS)
  13. shadow system
  14. data definition
  15. system software
  16. Structured Query Language (SQL)
  17. power of suppliers
  18. digital subscriber lines (DSL)
  19. support activities
  20. software
  21. hertz (Hz)
  22. bandwidth
  23. voice over IP (VoIP)
  24. network
  25. data mining
  26. primary activities
  27. n-tier
  28. computer
  29. metadata
  30. microwave transmission
  31. semi-structured information
  32. wireless router
  33. Data warehouse
  34. Data steward
  35. TCP/IP
  36. strategic enabler
  37. object-oriented programming
  38. business process
  39. enterprise architecture (EA)
  40. switching costs
  41. foreign keys
  42. focused niche strategy
  43. virtualization
  44. central processing unit (CPU)
  45. social networking sites
  46. operations management
  47. utility software
  48. database management software (DBMS)
  49. bits per second (bps)
  50. rivalry among existing competitors
  51. optical fiber
  52. customer relationship management (CRM) system
  53. database
  54. scalability
  55. private branch exchange (PBX)
  56. power of buyers
  57. user-generated content (UGC)
  58. master data management
  59. primary key
  60. circuit-switched network
  61. e-discovery
  62. byte
  63. WiMax
  64. big data
  65. competitive advantage
  66. table
  67. network effects
  68. chief information officer (CIO)
  69. Moore's Law
  70. Bluetooth
  71. unstructured information
  72. referential integrity
  73. functionally dependent
  74. local area network (LAN)
  75. value chain model
  76. information and communications technology (ICT)
  77. coaxial cables
  78. wavelength
  79. in-memory computing
  80. extract, transform, and load (ETL)
  81. information technology (IT)
  82. data-driven decision making
  83. crisis management team
  84. field
  85. client-server network
  86. data model
  87. creative destruction
  88. commercial off-the-shelf (COTS)
  89. software as a service (SaaS)
  90. threat of substitutes
  91. autonumbering
  92. optical scanners
  93. radio frequency identification (RFID)
  94. ecosystem
  95. wifi
  96. benchmark
  97. data dictionary
  98. batch processing
  99. business intelligence
  100. open source software
  101. disruptive innovation
  102. record
  103. packet switching
  104. interactive voice response (IVR)
  105. programming language
  106. application software
  107. random access memory (RAM)
  108. legacy systems
  109. ASCII code
  110. information system
  111. transistor
  112. Internet Protocol Version 6 (IPv6)
  113. operating system (OS)
  114. low cost leadership strategy
  115. normalization
  116. Web 2.0
  117. threat of new entrants
  118. e-government
  119. optical character recognition (OCR)
  120. relational database
  121. source code