radiofrequencyidentification(RFID)managementinformationsystems(MIS)sourcecodenetworkcompetitiveadvantageoperatingsystem(OS)socialnetworkingsitesnetworkeffectsprimaryactivitieshertz(Hz)scalabilitycommercialoff-the-shelf(COTS)n-tierbits persecond(bps)sustainingtechnologiesWiMaxBluetoothlow costleadershipstrategyvoiceover IP(VoIP)informationtechnology(IT)opticalfiberinformation andcommunicationstechnology (ICT)autonumberinginformationbenchmarkbusinessprocessmanagement(BPM)TCP/IPpeer-to-peernetworkoperationsmanagementin-memorycomputingEthernetdata-drivendecisionmakingtwistedpairwirespacketswitchingsemi-structuredinformationStructuredQueryLanguage(SQL)databaseschemapowerofbuyerscustomerrelationshipmanagement(CRM)systemobject-orientedprogrammingrecordfunctionallydependentthreatof newentrantsrandomaccessmemory(RAM)power ofsuppliersnormalizationecosystemwifibytedigitalsubscriberlines(DSL)businessintelligencemaster datamanagementcloudcomputingthreat ofsubstitutestransistorsystemsoftwareenterprisearchitecture(EA)Web2.0businessprocessfieldopensourcesoftwareunstructuredinformationapplicationsoftwarelegacysystemsdatabaseuser-generatedcontent(UGC)valuechainmodele-discoverylocal areanetwork(LAN)client-servernetworke-governmentcentralprocessingunit (CPU)dataminingrelationaldatabasemetadatadatadictionarydatamodelMoore'sLawdatabasemanagementsoftware(DBMS)circuit-switchednetworkinteractivevoiceresponse(IVR)bandwidthcreativedestructionstructuredinformationbigdatashadowsystemsupportactivitieswavelengthutilitysoftwareInternetProtocolVersion 6(IPv6)ASCIIcoderivalryamongexistingcompetitorsreferentialintegritycomputerchiefinformationofficer(CIO)virtualizationopticalcharacterrecognition(OCR)Datawarehousefocusednichestrategystrategicenablerinformationsystemcrisismanagementteamwirelessrouterdatadefinitionprogramminglanguagedata-drivendecisionmakingprivatebranchexchange(PBX)productdifferentiationstrategycoaxialcablesbatchprocessingforeignkeyssoftwareas aservice(SaaS)extract,transform,and load(ETL)Datastewardswitchingcostssoftwaretablemicrowavetransmissionprimarykeyopticalscannersdisruptiveinnovationradiofrequencyidentification(RFID)managementinformationsystems(MIS)sourcecodenetworkcompetitiveadvantageoperatingsystem(OS)socialnetworkingsitesnetworkeffectsprimaryactivitieshertz(Hz)scalabilitycommercialoff-the-shelf(COTS)n-tierbits persecond(bps)sustainingtechnologiesWiMaxBluetoothlow costleadershipstrategyvoiceover IP(VoIP)informationtechnology(IT)opticalfiberinformation andcommunicationstechnology (ICT)autonumberinginformationbenchmarkbusinessprocessmanagement(BPM)TCP/IPpeer-to-peernetworkoperationsmanagementin-memorycomputingEthernetdata-drivendecisionmakingtwistedpairwirespacketswitchingsemi-structuredinformationStructuredQueryLanguage(SQL)databaseschemapowerofbuyerscustomerrelationshipmanagement(CRM)systemobject-orientedprogrammingrecordfunctionallydependentthreatof newentrantsrandomaccessmemory(RAM)power ofsuppliersnormalizationecosystemwifibytedigitalsubscriberlines(DSL)businessintelligencemaster datamanagementcloudcomputingthreat ofsubstitutestransistorsystemsoftwareenterprisearchitecture(EA)Web2.0businessprocessfieldopensourcesoftwareunstructuredinformationapplicationsoftwarelegacysystemsdatabaseuser-generatedcontent(UGC)valuechainmodele-discoverylocal areanetwork(LAN)client-servernetworke-governmentcentralprocessingunit (CPU)dataminingrelationaldatabasemetadatadatadictionarydatamodelMoore'sLawdatabasemanagementsoftware(DBMS)circuit-switchednetworkinteractivevoiceresponse(IVR)bandwidthcreativedestructionstructuredinformationbigdatashadowsystemsupportactivitieswavelengthutilitysoftwareInternetProtocolVersion 6(IPv6)ASCIIcoderivalryamongexistingcompetitorsreferentialintegritycomputerchiefinformationofficer(CIO)virtualizationopticalcharacterrecognition(OCR)Datawarehousefocusednichestrategystrategicenablerinformationsystemcrisismanagementteamwirelessrouterdatadefinitionprogramminglanguagedata-drivendecisionmakingprivatebranchexchange(PBX)productdifferentiationstrategycoaxialcablesbatchprocessingforeignkeyssoftwareas aservice(SaaS)extract,transform,and load(ETL)Datastewardswitchingcostssoftwaretablemicrowavetransmissionprimarykeyopticalscannersdisruptiveinnovation

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. radio frequency identification (RFID)
  2. management information systems (MIS)
  3. source code
  4. network
  5. competitive advantage
  6. operating system (OS)
  7. social networking sites
  8. network effects
  9. primary activities
  10. hertz (Hz)
  11. scalability
  12. commercial off-the-shelf (COTS)
  13. n-tier
  14. bits per second (bps)
  15. sustaining technologies
  16. WiMax
  17. Bluetooth
  18. low cost leadership strategy
  19. voice over IP (VoIP)
  20. information technology (IT)
  21. optical fiber
  22. information and communications technology (ICT)
  23. autonumbering
  24. information
  25. benchmark
  26. business process management (BPM)
  27. TCP/IP
  28. peer-to-peer network
  29. operations management
  30. in-memory computing
  31. Ethernet
  32. data-driven decision making
  33. twisted pair wires
  34. packet switching
  35. semi-structured information
  36. Structured Query Language (SQL)
  37. database schema
  38. power of buyers
  39. customer relationship management (CRM) system
  40. object-oriented programming
  41. record
  42. functionally dependent
  43. threat of new entrants
  44. random access memory (RAM)
  45. power of suppliers
  46. normalization
  47. ecosystem
  48. wifi
  49. byte
  50. digital subscriber lines (DSL)
  51. business intelligence
  52. master data management
  53. cloud computing
  54. threat of substitutes
  55. transistor
  56. system software
  57. enterprise architecture (EA)
  58. Web 2.0
  59. business process
  60. field
  61. open source software
  62. unstructured information
  63. application software
  64. legacy systems
  65. database
  66. user-generated content (UGC)
  67. value chain model
  68. e-discovery
  69. local area network (LAN)
  70. client-server network
  71. e-government
  72. central processing unit (CPU)
  73. data mining
  74. relational database
  75. metadata
  76. data dictionary
  77. data model
  78. Moore's Law
  79. database management software (DBMS)
  80. circuit-switched network
  81. interactive voice response (IVR)
  82. bandwidth
  83. creative destruction
  84. structured information
  85. big data
  86. shadow system
  87. support activities
  88. wavelength
  89. utility software
  90. Internet Protocol Version 6 (IPv6)
  91. ASCII code
  92. rivalry among existing competitors
  93. referential integrity
  94. computer
  95. chief information officer (CIO)
  96. virtualization
  97. optical character recognition (OCR)
  98. Data warehouse
  99. focused niche strategy
  100. strategic enabler
  101. information system
  102. crisis management team
  103. wireless router
  104. data definition
  105. programming language
  106. data-driven decision making
  107. private branch exchange (PBX)
  108. product differentiation strategy
  109. coaxial cables
  110. batch processing
  111. foreign keys
  112. software as a service (SaaS)
  113. extract, transform, and load (ETL)
  114. Data steward
  115. switching costs
  116. software
  117. table
  118. microwave transmission
  119. primary key
  120. optical scanners
  121. disruptive innovation