primarykeynetworkBluetoothenterprisearchitecture(EA)disruptiveinnovationStructuredQueryLanguage(SQL)databasemanagementsoftware(DBMS)wirelessrouterdatadictionarypowerofbuyersfieldMoore'sLawcrisismanagementteamrecordopticalfibermicrowavetransmissionInternetProtocolVersion 6(IPv6)businessprocessmanagement(BPM)valuechainmodellow costleadershipstrategyproductdifferentiationstrategyvirtualizationdatadefinitionpower ofsuppliersopticalcharacterrecognition(OCR)wavelengthcircuit-switchednetworkdatabaseschemaobject-orientedprogrammingcloudcomputingsemi-structuredinformationautonumberingnetworkeffectsutilitysoftwaretablevoiceover IP(VoIP)primaryactivitiescreativedestructiondata-drivendecisionmakingsoftwareas aservice(SaaS)threatof newentrantsnormalizationWeb2.0informationsystembusinessprocessinformationbigdatainformationtechnology(IT)rivalryamongexistingcompetitorsASCIIcodedatabasefocusednichestrategybandwidthbytebenchmarkDatawarehouseEthernetsupportactivitiesecosystemcommercialoff-the-shelf(COTS)systemsoftwaren-tierrelationaldatabasepacketswitchingunstructuredinformationbusinessintelligencereferentialintegritysoftwarecoaxialcablesclient-servernetworkin-memorycomputingprogramminglanguagesourcecodesocialnetworkingsitesdigitalsubscriberlines(DSL)operatingsystem(OS)interactivevoiceresponse(IVR)applicationsoftwaree-governmentfunctionallydependentoperationsmanagementextract,transform,and load(ETL)legacysystemsforeignkeysthreat ofsubstitutesmanagementinformationsystems(MIS)TCP/IPopensourcesoftwarerandomaccessmemory(RAM)datamodelDatastewardWiMaxchiefinformationofficer(CIO)transistorscalabilityinformation andcommunicationstechnology (ICT)metadatasustainingtechnologiesuser-generatedcontent(UGC)shadowsystemopticalscannerscompetitiveadvantagecomputertwistedpairwiresradiofrequencyidentification(RFID)dataminingwificentralprocessingunit (CPU)master datamanagementswitchingcostscustomerrelationshipmanagement(CRM)systembits persecond(bps)hertz(Hz)peer-to-peernetworkstructuredinformationlocal areanetwork(LAN)strategicenablerprivatebranchexchange(PBX)data-drivendecisionmakinge-discoverybatchprocessingprimarykeynetworkBluetoothenterprisearchitecture(EA)disruptiveinnovationStructuredQueryLanguage(SQL)databasemanagementsoftware(DBMS)wirelessrouterdatadictionarypowerofbuyersfieldMoore'sLawcrisismanagementteamrecordopticalfibermicrowavetransmissionInternetProtocolVersion 6(IPv6)businessprocessmanagement(BPM)valuechainmodellow costleadershipstrategyproductdifferentiationstrategyvirtualizationdatadefinitionpower ofsuppliersopticalcharacterrecognition(OCR)wavelengthcircuit-switchednetworkdatabaseschemaobject-orientedprogrammingcloudcomputingsemi-structuredinformationautonumberingnetworkeffectsutilitysoftwaretablevoiceover IP(VoIP)primaryactivitiescreativedestructiondata-drivendecisionmakingsoftwareas aservice(SaaS)threatof newentrantsnormalizationWeb2.0informationsystembusinessprocessinformationbigdatainformationtechnology(IT)rivalryamongexistingcompetitorsASCIIcodedatabasefocusednichestrategybandwidthbytebenchmarkDatawarehouseEthernetsupportactivitiesecosystemcommercialoff-the-shelf(COTS)systemsoftwaren-tierrelationaldatabasepacketswitchingunstructuredinformationbusinessintelligencereferentialintegritysoftwarecoaxialcablesclient-servernetworkin-memorycomputingprogramminglanguagesourcecodesocialnetworkingsitesdigitalsubscriberlines(DSL)operatingsystem(OS)interactivevoiceresponse(IVR)applicationsoftwaree-governmentfunctionallydependentoperationsmanagementextract,transform,and load(ETL)legacysystemsforeignkeysthreat ofsubstitutesmanagementinformationsystems(MIS)TCP/IPopensourcesoftwarerandomaccessmemory(RAM)datamodelDatastewardWiMaxchiefinformationofficer(CIO)transistorscalabilityinformation andcommunicationstechnology (ICT)metadatasustainingtechnologiesuser-generatedcontent(UGC)shadowsystemopticalscannerscompetitiveadvantagecomputertwistedpairwiresradiofrequencyidentification(RFID)dataminingwificentralprocessingunit (CPU)master datamanagementswitchingcostscustomerrelationshipmanagement(CRM)systembits persecond(bps)hertz(Hz)peer-to-peernetworkstructuredinformationlocal areanetwork(LAN)strategicenablerprivatebranchexchange(PBX)data-drivendecisionmakinge-discoverybatchprocessing

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. primary key
  2. network
  3. Bluetooth
  4. enterprise architecture (EA)
  5. disruptive innovation
  6. Structured Query Language (SQL)
  7. database management software (DBMS)
  8. wireless router
  9. data dictionary
  10. power of buyers
  11. field
  12. Moore's Law
  13. crisis management team
  14. record
  15. optical fiber
  16. microwave transmission
  17. Internet Protocol Version 6 (IPv6)
  18. business process management (BPM)
  19. value chain model
  20. low cost leadership strategy
  21. product differentiation strategy
  22. virtualization
  23. data definition
  24. power of suppliers
  25. optical character recognition (OCR)
  26. wavelength
  27. circuit-switched network
  28. database schema
  29. object-oriented programming
  30. cloud computing
  31. semi-structured information
  32. autonumbering
  33. network effects
  34. utility software
  35. table
  36. voice over IP (VoIP)
  37. primary activities
  38. creative destruction
  39. data-driven decision making
  40. software as a service (SaaS)
  41. threat of new entrants
  42. normalization
  43. Web 2.0
  44. information system
  45. business process
  46. information
  47. big data
  48. information technology (IT)
  49. rivalry among existing competitors
  50. ASCII code
  51. database
  52. focused niche strategy
  53. bandwidth
  54. byte
  55. benchmark
  56. Data warehouse
  57. Ethernet
  58. support activities
  59. ecosystem
  60. commercial off-the-shelf (COTS)
  61. system software
  62. n-tier
  63. relational database
  64. packet switching
  65. unstructured information
  66. business intelligence
  67. referential integrity
  68. software
  69. coaxial cables
  70. client-server network
  71. in-memory computing
  72. programming language
  73. source code
  74. social networking sites
  75. digital subscriber lines (DSL)
  76. operating system (OS)
  77. interactive voice response (IVR)
  78. application software
  79. e-government
  80. functionally dependent
  81. operations management
  82. extract, transform, and load (ETL)
  83. legacy systems
  84. foreign keys
  85. threat of substitutes
  86. management information systems (MIS)
  87. TCP/IP
  88. open source software
  89. random access memory (RAM)
  90. data model
  91. Data steward
  92. WiMax
  93. chief information officer (CIO)
  94. transistor
  95. scalability
  96. information and communications technology (ICT)
  97. metadata
  98. sustaining technologies
  99. user-generated content (UGC)
  100. shadow system
  101. optical scanners
  102. competitive advantage
  103. computer
  104. twisted pair wires
  105. radio frequency identification (RFID)
  106. data mining
  107. wifi
  108. central processing unit (CPU)
  109. master data management
  110. switching costs
  111. customer relationship management (CRM) system
  112. bits per second (bps)
  113. hertz (Hz)
  114. peer-to-peer network
  115. structured information
  116. local area network (LAN)
  117. strategic enabler
  118. private branch exchange (PBX)
  119. data-driven decision making
  120. e-discovery
  121. batch processing