bandwidth client- server network peer-to- peer network cloud computing TCP/IP transistor in- memory computing virtualization e- government business process hertz (Hz) benchmark voice over IP (VoIP) utility software twisted pair wires digital subscriber lines (DSL) wireless router management information systems (MIS) local area network (LAN) business process management (BPM) crisis management team private branch exchange (PBX) packet switching open source software operations management enterprise architecture (EA) application software disruptive innovation threat of substitutes business intelligence ASCII code radio frequency identification (RFID) value chain model operating system (OS) Ethernet power of buyers information and communications technology (ICT) coaxial cables strategic enabler computer legacy systems Web 2.0 information technology (IT) commercial off-the- shelf (COTS) threat of new entrants focused niche strategy support activities data- driven decision making ecosystem wifi byte WiMax bits per second (bps) power of suppliers software Internet Protocol Version 6 (IPv6) software as a service (SaaS) circuit- switched network network effects random access memory (RAM) system software information system optical fiber rivalry among existing competitors object- oriented programming optical scanners creative destruction wavelength information competitive advantage programming language data- driven decision making e- discovery user- generated content (UGC) source code n-tier Moore's Law product differentiation strategy primary activities sustaining technologies switching costs low cost leadership strategy network central processing unit (CPU) microwave transmission Bluetooth optical character recognition (OCR) customer relationship management (CRM) system chief information officer (CIO) social networking sites bandwidth client- server network peer-to- peer network cloud computing TCP/IP transistor in- memory computing virtualization e- government business process hertz (Hz) benchmark voice over IP (VoIP) utility software twisted pair wires digital subscriber lines (DSL) wireless router management information systems (MIS) local area network (LAN) business process management (BPM) crisis management team private branch exchange (PBX) packet switching open source software operations management enterprise architecture (EA) application software disruptive innovation threat of substitutes business intelligence ASCII code radio frequency identification (RFID) value chain model operating system (OS) Ethernet power of buyers information and communications technology (ICT) coaxial cables strategic enabler computer legacy systems Web 2.0 information technology (IT) commercial off-the- shelf (COTS) threat of new entrants focused niche strategy support activities data- driven decision making ecosystem wifi byte WiMax bits per second (bps) power of suppliers software Internet Protocol Version 6 (IPv6) software as a service (SaaS) circuit- switched network network effects random access memory (RAM) system software information system optical fiber rivalry among existing competitors object- oriented programming optical scanners creative destruction wavelength information competitive advantage programming language data- driven decision making e- discovery user- generated content (UGC) source code n-tier Moore's Law product differentiation strategy primary activities sustaining technologies switching costs low cost leadership strategy network central processing unit (CPU) microwave transmission Bluetooth optical character recognition (OCR) customer relationship management (CRM) system chief information officer (CIO) social networking sites
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
bandwidth
client-server network
peer-to-peer network
cloud computing
TCP/IP
transistor
in-memory computing
virtualization
e-government
business process
hertz (Hz)
benchmark
voice over IP (VoIP)
utility software
twisted pair wires
digital subscriber lines (DSL)
wireless router
management information systems (MIS)
local area network (LAN)
business process management (BPM)
crisis management team
private branch exchange (PBX)
packet switching
open source software
operations management
enterprise architecture (EA)
application software
disruptive innovation
threat of substitutes
business intelligence
ASCII code
radio frequency identification (RFID)
value chain model
operating system (OS)
Ethernet
power of buyers
information and communications technology (ICT)
coaxial cables
strategic enabler
computer
legacy systems
Web 2.0
information technology (IT)
commercial off-the-shelf (COTS)
threat of new entrants
focused niche strategy
support activities
data-driven decision making
ecosystem
wifi
byte
WiMax
bits per second (bps)
power of suppliers
software
Internet Protocol Version 6 (IPv6)
software as a service (SaaS)
circuit-switched network
network effects
random access memory (RAM)
system software
information system
optical fiber
rivalry among existing competitors
object-oriented programming
optical scanners
creative destruction
wavelength
information
competitive advantage
programming language
data-driven decision making
e-discovery
user-generated content (UGC)
source code
n-tier
Moore's Law
product differentiation strategy
primary activities
sustaining technologies
switching costs
low cost leadership strategy
network
central processing unit (CPU)
microwave transmission
Bluetooth
optical character recognition (OCR)
customer relationship management (CRM) system
chief information officer (CIO)
social networking sites