data- driven decision making peer-to- peer network Ethernet sustaining technologies information business process management (BPM) cloud computing twisted pair wires product differentiation strategy database schema structured information management information systems (MIS) shadow system data definition system software Structured Query Language (SQL) power of suppliers digital subscriber lines (DSL) support activities software hertz (Hz) bandwidth voice over IP (VoIP) network data mining primary activities n-tier computer metadata microwave transmission semi- structured information wireless router Data warehouse Data steward TCP/IP strategic enabler object- oriented programming business process enterprise architecture (EA) switching costs foreign keys focused niche strategy virtualization central processing unit (CPU) social networking sites operations management utility software database management software (DBMS) bits per second (bps) rivalry among existing competitors optical fiber customer relationship management (CRM) system database scalability private branch exchange (PBX) power of buyers user- generated content (UGC) master data management primary key circuit- switched network e- discovery byte WiMax big data competitive advantage table network effects chief information officer (CIO) Moore's Law Bluetooth unstructured information referential integrity functionally dependent local area network (LAN) value chain model information and communications technology (ICT) coaxial cables wavelength in- memory computing extract, transform, and load (ETL) information technology (IT) data- driven decision making crisis management team field client- server network data model creative destruction commercial off-the- shelf (COTS) software as a service (SaaS) threat of substitutes autonumbering optical scanners radio frequency identification (RFID) ecosystem wifi benchmark data dictionary batch processing business intelligence open source software disruptive innovation record packet switching interactive voice response (IVR) programming language application software random access memory (RAM) legacy systems ASCII code information system transistor Internet Protocol Version 6 (IPv6) operating system (OS) low cost leadership strategy normalization Web 2.0 threat of new entrants e- government optical character recognition (OCR) relational database source code data- driven decision making peer-to- peer network Ethernet sustaining technologies information business process management (BPM) cloud computing twisted pair wires product differentiation strategy database schema structured information management information systems (MIS) shadow system data definition system software Structured Query Language (SQL) power of suppliers digital subscriber lines (DSL) support activities software hertz (Hz) bandwidth voice over IP (VoIP) network data mining primary activities n-tier computer metadata microwave transmission semi- structured information wireless router Data warehouse Data steward TCP/IP strategic enabler object- oriented programming business process enterprise architecture (EA) switching costs foreign keys focused niche strategy virtualization central processing unit (CPU) social networking sites operations management utility software database management software (DBMS) bits per second (bps) rivalry among existing competitors optical fiber customer relationship management (CRM) system database scalability private branch exchange (PBX) power of buyers user- generated content (UGC) master data management primary key circuit- switched network e- discovery byte WiMax big data competitive advantage table network effects chief information officer (CIO) Moore's Law Bluetooth unstructured information referential integrity functionally dependent local area network (LAN) value chain model information and communications technology (ICT) coaxial cables wavelength in- memory computing extract, transform, and load (ETL) information technology (IT) data- driven decision making crisis management team field client- server network data model creative destruction commercial off-the- shelf (COTS) software as a service (SaaS) threat of substitutes autonumbering optical scanners radio frequency identification (RFID) ecosystem wifi benchmark data dictionary batch processing business intelligence open source software disruptive innovation record packet switching interactive voice response (IVR) programming language application software random access memory (RAM) legacy systems ASCII code information system transistor Internet Protocol Version 6 (IPv6) operating system (OS) low cost leadership strategy normalization Web 2.0 threat of new entrants e- government optical character recognition (OCR) relational database source code
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
data-driven decision making
peer-to-peer network
Ethernet
sustaining technologies
information
business process management (BPM)
cloud computing
twisted pair wires
product differentiation strategy
database schema
structured information
management information systems (MIS)
shadow system
data definition
system software
Structured Query Language (SQL)
power of suppliers
digital subscriber lines (DSL)
support activities
software
hertz (Hz)
bandwidth
voice over IP (VoIP)
network
data mining
primary activities
n-tier
computer
metadata
microwave transmission
semi-structured information
wireless router
Data warehouse
Data steward
TCP/IP
strategic enabler
object-oriented programming
business process
enterprise architecture (EA)
switching costs
foreign keys
focused niche strategy
virtualization
central processing unit (CPU)
social networking sites
operations management
utility software
database management software (DBMS)
bits per second (bps)
rivalry among existing competitors
optical fiber
customer relationship management (CRM) system
database
scalability
private branch exchange (PBX)
power of buyers
user-generated content (UGC)
master data management
primary key
circuit-switched network
e-discovery
byte
WiMax
big data
competitive advantage
table
network effects
chief information officer (CIO)
Moore's Law
Bluetooth
unstructured information
referential integrity
functionally dependent
local area network (LAN)
value chain model
information and communications technology (ICT)
coaxial cables
wavelength
in-memory computing
extract, transform, and load (ETL)
information technology (IT)
data-driven decision making
crisis management team
field
client-server network
data model
creative destruction
commercial off-the-shelf (COTS)
software as a service (SaaS)
threat of substitutes
autonumbering
optical scanners
radio frequency identification (RFID)
ecosystem
wifi
benchmark
data dictionary
batch processing
business intelligence
open source software
disruptive innovation
record
packet switching
interactive voice response (IVR)
programming language
application software
random access memory (RAM)
legacy systems
ASCII code
information system
transistor
Internet Protocol Version 6 (IPv6)
operating system (OS)
low cost leadership strategy
normalization
Web 2.0
threat of new entrants
e-government
optical character recognition (OCR)
relational database
source code