opticalfibersocialnetworkingsitesapplicationsoftwareecosystemdatadefinitionsourcecodeASCIIcodefocusednichestrategycreativedestructionbytemanagementinformationsystems(MIS)Bluetoothstructuredinformationprogramminglanguagedata-drivendecisionmakinglegacysystemsnetworkextract,transform,and load(ETL)radiofrequencyidentification(RFID)WiMaxe-discoverydata-drivendecisionmakingmicrowavetransmissionsupportactivitiesDatawarehousewavelengthcompetitiveadvantageoperationsmanagementpeer-to-peernetworkbits persecond(bps)local areanetwork(LAN)privatebranchexchange(PBX)coaxialcablesrandomaccessmemory(RAM)informationtechnology(IT)StructuredQueryLanguage(SQL)master datamanagementdatabaseschemanetworkeffectsTCP/IPtabledatamininglow costleadershipstrategywirelessroutersemi-structuredinformationrecordutilitysoftwareenterprisearchitecture(EA)disruptiveinnovationbusinessprocessscalabilityin-memorycomputingsoftwareas aservice(SaaS)object-orientedprogramminginformationsystemMoore'sLawthreat ofsubstitutesprimarykeydatadictionaryvirtualizationchiefinformationofficer(CIO)fieldbigdataclient-servernetworkshadowsystempower ofsuppliersmetadatasustainingtechnologiesuser-generatedcontent(UGC)operatingsystem(OS)productdifferentiationstrategynormalizationpowerofbuyersbandwidthrivalryamongexistingcompetitorsvaluechainmodelInternetProtocolVersion 6(IPv6)information andcommunicationstechnology (ICT)switchingcostsopticalscannerscloudcomputingtransistorbusinessintelligencecommercialoff-the-shelf(COTS)systemsoftwarebusinessprocessmanagement(BPM)EthernetopensourcesoftwaresoftwareWeb2.0digitalsubscriberlines(DSL)computerinteractivevoiceresponse(IVR)e-governmentcentralprocessingunit (CPU)informationthreatof newentrantsreferentialintegrityvoiceover IP(VoIP)strategicenablerpacketswitchingautonumberingdatamodelhertz(Hz)n-tierbenchmarkbatchprocessingdatabasemanagementsoftware(DBMS)crisismanagementteamwificircuit-switchednetworkrelationaldatabaseDatastewarddatabasecustomerrelationshipmanagement(CRM)systemopticalcharacterrecognition(OCR)twistedpairwiresprimaryactivitiesforeignkeysfunctionallydependentunstructuredinformationopticalfibersocialnetworkingsitesapplicationsoftwareecosystemdatadefinitionsourcecodeASCIIcodefocusednichestrategycreativedestructionbytemanagementinformationsystems(MIS)Bluetoothstructuredinformationprogramminglanguagedata-drivendecisionmakinglegacysystemsnetworkextract,transform,and load(ETL)radiofrequencyidentification(RFID)WiMaxe-discoverydata-drivendecisionmakingmicrowavetransmissionsupportactivitiesDatawarehousewavelengthcompetitiveadvantageoperationsmanagementpeer-to-peernetworkbits persecond(bps)local areanetwork(LAN)privatebranchexchange(PBX)coaxialcablesrandomaccessmemory(RAM)informationtechnology(IT)StructuredQueryLanguage(SQL)master datamanagementdatabaseschemanetworkeffectsTCP/IPtabledatamininglow costleadershipstrategywirelessroutersemi-structuredinformationrecordutilitysoftwareenterprisearchitecture(EA)disruptiveinnovationbusinessprocessscalabilityin-memorycomputingsoftwareas aservice(SaaS)object-orientedprogramminginformationsystemMoore'sLawthreat ofsubstitutesprimarykeydatadictionaryvirtualizationchiefinformationofficer(CIO)fieldbigdataclient-servernetworkshadowsystempower ofsuppliersmetadatasustainingtechnologiesuser-generatedcontent(UGC)operatingsystem(OS)productdifferentiationstrategynormalizationpowerofbuyersbandwidthrivalryamongexistingcompetitorsvaluechainmodelInternetProtocolVersion 6(IPv6)information andcommunicationstechnology (ICT)switchingcostsopticalscannerscloudcomputingtransistorbusinessintelligencecommercialoff-the-shelf(COTS)systemsoftwarebusinessprocessmanagement(BPM)EthernetopensourcesoftwaresoftwareWeb2.0digitalsubscriberlines(DSL)computerinteractivevoiceresponse(IVR)e-governmentcentralprocessingunit (CPU)informationthreatof newentrantsreferentialintegrityvoiceover IP(VoIP)strategicenablerpacketswitchingautonumberingdatamodelhertz(Hz)n-tierbenchmarkbatchprocessingdatabasemanagementsoftware(DBMS)crisismanagementteamwificircuit-switchednetworkrelationaldatabaseDatastewarddatabasecustomerrelationshipmanagement(CRM)systemopticalcharacterrecognition(OCR)twistedpairwiresprimaryactivitiesforeignkeysfunctionallydependentunstructuredinformation

GE202 Chap 1, 2, 3, 4 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
  1. optical fiber
  2. social networking sites
  3. application software
  4. ecosystem
  5. data definition
  6. source code
  7. ASCII code
  8. focused niche strategy
  9. creative destruction
  10. byte
  11. management information systems (MIS)
  12. Bluetooth
  13. structured information
  14. programming language
  15. data-driven decision making
  16. legacy systems
  17. network
  18. extract, transform, and load (ETL)
  19. radio frequency identification (RFID)
  20. WiMax
  21. e-discovery
  22. data-driven decision making
  23. microwave transmission
  24. support activities
  25. Data warehouse
  26. wavelength
  27. competitive advantage
  28. operations management
  29. peer-to-peer network
  30. bits per second (bps)
  31. local area network (LAN)
  32. private branch exchange (PBX)
  33. coaxial cables
  34. random access memory (RAM)
  35. information technology (IT)
  36. Structured Query Language (SQL)
  37. master data management
  38. database schema
  39. network effects
  40. TCP/IP
  41. table
  42. data mining
  43. low cost leadership strategy
  44. wireless router
  45. semi-structured information
  46. record
  47. utility software
  48. enterprise architecture (EA)
  49. disruptive innovation
  50. business process
  51. scalability
  52. in-memory computing
  53. software as a service (SaaS)
  54. object-oriented programming
  55. information system
  56. Moore's Law
  57. threat of substitutes
  58. primary key
  59. data dictionary
  60. virtualization
  61. chief information officer (CIO)
  62. field
  63. big data
  64. client-server network
  65. shadow system
  66. power of suppliers
  67. metadata
  68. sustaining technologies
  69. user-generated content (UGC)
  70. operating system (OS)
  71. product differentiation strategy
  72. normalization
  73. power of buyers
  74. bandwidth
  75. rivalry among existing competitors
  76. value chain model
  77. Internet Protocol Version 6 (IPv6)
  78. information and communications technology (ICT)
  79. switching costs
  80. optical scanners
  81. cloud computing
  82. transistor
  83. business intelligence
  84. commercial off-the-shelf (COTS)
  85. system software
  86. business process management (BPM)
  87. Ethernet
  88. open source software
  89. software
  90. Web 2.0
  91. digital subscriber lines (DSL)
  92. computer
  93. interactive voice response (IVR)
  94. e-government
  95. central processing unit (CPU)
  96. information
  97. threat of new entrants
  98. referential integrity
  99. voice over IP (VoIP)
  100. strategic enabler
  101. packet switching
  102. autonumbering
  103. data model
  104. hertz (Hz)
  105. n-tier
  106. benchmark
  107. batch processing
  108. database management software (DBMS)
  109. crisis management team
  110. wifi
  111. circuit-switched network
  112. relational database
  113. Data steward
  114. database
  115. customer relationship management (CRM) system
  116. optical character recognition (OCR)
  117. twisted pair wires
  118. primary activities
  119. foreign keys
  120. functionally dependent
  121. unstructured information