operationsmanagementwavelengthmanagementinformationsystems(MIS)applicationsoftwarelow costleadershipstrategyinformationfocusednichestrategynetworkWeb2.0enterprisearchitecture(EA)creativedestructionsoftwareas aservice(SaaS)sourcecodebusinessprocessmanagement(BPM)switchingcostscentralprocessingunit (CPU)threat ofsubstitutescommercialoff-the-shelf(COTS)randomaccessmemory(RAM)threatof newentrantspacketswitchinginformationsysteminformation andcommunicationstechnology (ICT)n-tierin-memorycomputingbytecloudcomputingdigitalsubscriberlines(DSL)peer-to-peernetworkvaluechainmodelbits persecond(bps)Bluetoothhertz(Hz)socialnetworkingsitesbenchmarkWiMaxstrategicenablersupportactivitiesbusinessintelligenceprogramminglanguageoperatingsystem(OS)competitiveadvantagesystemsoftwareopticalcharacterrecognition(OCR)privatebranchexchange(PBX)object-orientedprogramminglegacysystemscustomerrelationshipmanagement(CRM)systemtransistorcomputernetworkeffectse-discoverysustainingtechnologiesvirtualizationtwistedpairwiresopensourcesoftwareTCP/IPbandwidthdata-drivendecisionmakingmicrowavetransmissionpower ofsupplierslocal areanetwork(LAN)productdifferentiationstrategyrivalryamongexistingcompetitorse-governmentInternetProtocolVersion 6(IPv6)user-generatedcontent(UGC)coaxialcablessoftwarechiefinformationofficer(CIO)data-drivendecisionmakingecosystemopticalfiberradiofrequencyidentification(RFID)crisismanagementteamvoiceover IP(VoIP)informationtechnology(IT)utilitysoftwareEthernetprimaryactivitiesclient-servernetworkopticalscannersASCIIcodebusinessprocessMoore'sLawcircuit-switchednetworkwifiwirelessrouterdisruptiveinnovationpowerofbuyersoperationsmanagementwavelengthmanagementinformationsystems(MIS)applicationsoftwarelow costleadershipstrategyinformationfocusednichestrategynetworkWeb2.0enterprisearchitecture(EA)creativedestructionsoftwareas aservice(SaaS)sourcecodebusinessprocessmanagement(BPM)switchingcostscentralprocessingunit (CPU)threat ofsubstitutescommercialoff-the-shelf(COTS)randomaccessmemory(RAM)threatof newentrantspacketswitchinginformationsysteminformation andcommunicationstechnology (ICT)n-tierin-memorycomputingbytecloudcomputingdigitalsubscriberlines(DSL)peer-to-peernetworkvaluechainmodelbits persecond(bps)Bluetoothhertz(Hz)socialnetworkingsitesbenchmarkWiMaxstrategicenablersupportactivitiesbusinessintelligenceprogramminglanguageoperatingsystem(OS)competitiveadvantagesystemsoftwareopticalcharacterrecognition(OCR)privatebranchexchange(PBX)object-orientedprogramminglegacysystemscustomerrelationshipmanagement(CRM)systemtransistorcomputernetworkeffectse-discoverysustainingtechnologiesvirtualizationtwistedpairwiresopensourcesoftwareTCP/IPbandwidthdata-drivendecisionmakingmicrowavetransmissionpower ofsupplierslocal areanetwork(LAN)productdifferentiationstrategyrivalryamongexistingcompetitorse-governmentInternetProtocolVersion 6(IPv6)user-generatedcontent(UGC)coaxialcablessoftwarechiefinformationofficer(CIO)data-drivendecisionmakingecosystemopticalfiberradiofrequencyidentification(RFID)crisismanagementteamvoiceover IP(VoIP)informationtechnology(IT)utilitysoftwareEthernetprimaryactivitiesclient-servernetworkopticalscannersASCIIcodebusinessprocessMoore'sLawcircuit-switchednetworkwifiwirelessrouterdisruptiveinnovationpowerofbuyers

GE202 Chapter 1-3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
  1. operations management
  2. wavelength
  3. management information systems (MIS)
  4. application software
  5. low cost leadership strategy
  6. information
  7. focused niche strategy
  8. network
  9. Web 2.0
  10. enterprise architecture (EA)
  11. creative destruction
  12. software as a service (SaaS)
  13. source code
  14. business process management (BPM)
  15. switching costs
  16. central processing unit (CPU)
  17. threat of substitutes
  18. commercial off-the-shelf (COTS)
  19. random access memory (RAM)
  20. threat of new entrants
  21. packet switching
  22. information system
  23. information and communications technology (ICT)
  24. n-tier
  25. in-memory computing
  26. byte
  27. cloud computing
  28. digital subscriber lines (DSL)
  29. peer-to-peer network
  30. value chain model
  31. bits per second (bps)
  32. Bluetooth
  33. hertz (Hz)
  34. social networking sites
  35. benchmark
  36. WiMax
  37. strategic enabler
  38. support activities
  39. business intelligence
  40. programming language
  41. operating system (OS)
  42. competitive advantage
  43. system software
  44. optical character recognition (OCR)
  45. private branch exchange (PBX)
  46. object-oriented programming
  47. legacy systems
  48. customer relationship management (CRM) system
  49. transistor
  50. computer
  51. network effects
  52. e-discovery
  53. sustaining technologies
  54. virtualization
  55. twisted pair wires
  56. open source software
  57. TCP/IP
  58. bandwidth
  59. data-driven decision making
  60. microwave transmission
  61. power of suppliers
  62. local area network (LAN)
  63. product differentiation strategy
  64. rivalry among existing competitors
  65. e-government
  66. Internet Protocol Version 6 (IPv6)
  67. user-generated content (UGC)
  68. coaxial cables
  69. software
  70. chief information officer (CIO)
  71. data-driven decision making
  72. ecosystem
  73. optical fiber
  74. radio frequency identification (RFID)
  75. crisis management team
  76. voice over IP (VoIP)
  77. information technology (IT)
  78. utility software
  79. Ethernet
  80. primary activities
  81. client-server network
  82. optical scanners
  83. ASCII code
  84. business process
  85. Moore's Law
  86. circuit-switched network
  87. wifi
  88. wireless router
  89. disruptive innovation
  90. power of buyers