radio frequency identification (RFID) management information systems (MIS) source code network competitive advantage operating system (OS) social networking sites network effects primary activities hertz (Hz) scalability commercial off-the- shelf (COTS) n-tier bits per second (bps) sustaining technologies WiMax Bluetooth low cost leadership strategy voice over IP (VoIP) information technology (IT) optical fiber information and communications technology (ICT) autonumbering information benchmark business process management (BPM) TCP/IP peer-to- peer network operations management in- memory computing Ethernet data- driven decision making twisted pair wires packet switching semi- structured information Structured Query Language (SQL) database schema power of buyers customer relationship management (CRM) system object- oriented programming record functionally dependent threat of new entrants random access memory (RAM) power of suppliers normalization ecosystem wifi byte digital subscriber lines (DSL) business intelligence master data management cloud computing threat of substitutes transistor system software enterprise architecture (EA) Web 2.0 business process field open source software unstructured information application software legacy systems database user- generated content (UGC) value chain model e- discovery local area network (LAN) client- server network e- government central processing unit (CPU) data mining relational database metadata data dictionary data model Moore's Law database management software (DBMS) circuit- switched network interactive voice response (IVR) bandwidth creative destruction structured information big data shadow system support activities wavelength utility software Internet Protocol Version 6 (IPv6) ASCII code rivalry among existing competitors referential integrity computer chief information officer (CIO) virtualization optical character recognition (OCR) Data warehouse focused niche strategy strategic enabler information system crisis management team wireless router data definition programming language data- driven decision making private branch exchange (PBX) product differentiation strategy coaxial cables batch processing foreign keys software as a service (SaaS) extract, transform, and load (ETL) Data steward switching costs software table microwave transmission primary key optical scanners disruptive innovation radio frequency identification (RFID) management information systems (MIS) source code network competitive advantage operating system (OS) social networking sites network effects primary activities hertz (Hz) scalability commercial off-the- shelf (COTS) n-tier bits per second (bps) sustaining technologies WiMax Bluetooth low cost leadership strategy voice over IP (VoIP) information technology (IT) optical fiber information and communications technology (ICT) autonumbering information benchmark business process management (BPM) TCP/IP peer-to- peer network operations management in- memory computing Ethernet data- driven decision making twisted pair wires packet switching semi- structured information Structured Query Language (SQL) database schema power of buyers customer relationship management (CRM) system object- oriented programming record functionally dependent threat of new entrants random access memory (RAM) power of suppliers normalization ecosystem wifi byte digital subscriber lines (DSL) business intelligence master data management cloud computing threat of substitutes transistor system software enterprise architecture (EA) Web 2.0 business process field open source software unstructured information application software legacy systems database user- generated content (UGC) value chain model e- discovery local area network (LAN) client- server network e- government central processing unit (CPU) data mining relational database metadata data dictionary data model Moore's Law database management software (DBMS) circuit- switched network interactive voice response (IVR) bandwidth creative destruction structured information big data shadow system support activities wavelength utility software Internet Protocol Version 6 (IPv6) ASCII code rivalry among existing competitors referential integrity computer chief information officer (CIO) virtualization optical character recognition (OCR) Data warehouse focused niche strategy strategic enabler information system crisis management team wireless router data definition programming language data- driven decision making private branch exchange (PBX) product differentiation strategy coaxial cables batch processing foreign keys software as a service (SaaS) extract, transform, and load (ETL) Data steward switching costs software table microwave transmission primary key optical scanners disruptive innovation
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
radio frequency identification (RFID)
management information systems (MIS)
source code
network
competitive advantage
operating system (OS)
social networking sites
network effects
primary activities
hertz (Hz)
scalability
commercial off-the-shelf (COTS)
n-tier
bits per second (bps)
sustaining technologies
WiMax
Bluetooth
low cost leadership strategy
voice over IP (VoIP)
information technology (IT)
optical fiber
information and communications technology (ICT)
autonumbering
information
benchmark
business process management (BPM)
TCP/IP
peer-to-peer network
operations management
in-memory computing
Ethernet
data-driven decision making
twisted pair wires
packet switching
semi-structured information
Structured Query Language (SQL)
database schema
power of buyers
customer relationship management (CRM) system
object-oriented programming
record
functionally dependent
threat of new entrants
random access memory (RAM)
power of suppliers
normalization
ecosystem
wifi
byte
digital subscriber lines (DSL)
business intelligence
master data management
cloud computing
threat of substitutes
transistor
system software
enterprise architecture (EA)
Web 2.0
business process
field
open source software
unstructured information
application software
legacy systems
database
user-generated content (UGC)
value chain model
e-discovery
local area network (LAN)
client-server network
e-government
central processing unit (CPU)
data mining
relational database
metadata
data dictionary
data model
Moore's Law
database management software (DBMS)
circuit-switched network
interactive voice response (IVR)
bandwidth
creative destruction
structured information
big data
shadow system
support activities
wavelength
utility software
Internet Protocol Version 6 (IPv6)
ASCII code
rivalry among existing competitors
referential integrity
computer
chief information officer (CIO)
virtualization
optical character recognition (OCR)
Data warehouse
focused niche strategy
strategic enabler
information system
crisis management team
wireless router
data definition
programming language
data-driven decision making
private branch exchange (PBX)
product differentiation strategy
coaxial cables
batch processing
foreign keys
software as a service (SaaS)
extract, transform, and load (ETL)
Data steward
switching costs
software
table
microwave transmission
primary key
optical scanners
disruptive innovation