Moore'sLawthreatof newentrantsrandomaccessmemory(RAM)computerproductdifferentiationstrategytwistedpairwiresthreat ofsubstitutesprimaryactivitieshertz(Hz)legacysystemsvirtualizationn-tiercrisismanagementteampower ofsuppliersnetworkvaluechainmodelsourcecodefocusednichestrategysocialnetworkingsitessoftwareas aservice(SaaS)customerrelationshipmanagement(CRM)systempeer-to-peernetworkutilitysoftwareradiofrequencyidentification(RFID)operationsmanagementwifichiefinformationofficer(CIO)supportactivitiesdata-drivendecisionmakingcommercialoff-the-shelf(COTS)Web2.0benchmarkclient-servernetworkopensourcesoftwareEthernetBluetoothcreativedestructionlocal areanetwork(LAN)powerofbuyersuser-generatedcontent(UGC)byteoperatingsystem(OS)object-orientedprogrammingstrategicenablermanagementinformationsystems(MIS)ecosystemin-memorycomputinginformationtechnology(IT)opticalscannerscentralprocessingunit (CPU)digitalsubscriberlines(DSL)coaxialcablesdata-drivendecisionmakingASCIIcodesustainingtechnologiesWiMaxbusinessprocessnetworkeffectscloudcomputinglow costleadershipstrategyprivatebranchexchange(PBX)programminglanguageenterprisearchitecture(EA)applicationsoftwarepacketswitchingbandwidthopticalcharacterrecognition(OCR)microwavetransmissione-governmentinformationsystemsoftwareswitchingcoststransistorinformationsystemsoftwarebits persecond(bps)opticalfiberrivalryamongexistingcompetitorsInternetProtocolVersion 6(IPv6)wirelessrouterdisruptiveinnovationcircuit-switchednetworke-discoverybusinessprocessmanagement(BPM)wavelengthvoiceover IP(VoIP)TCP/IPbusinessintelligenceinformation andcommunicationstechnology (ICT)competitiveadvantageMoore'sLawthreatof newentrantsrandomaccessmemory(RAM)computerproductdifferentiationstrategytwistedpairwiresthreat ofsubstitutesprimaryactivitieshertz(Hz)legacysystemsvirtualizationn-tiercrisismanagementteampower ofsuppliersnetworkvaluechainmodelsourcecodefocusednichestrategysocialnetworkingsitessoftwareas aservice(SaaS)customerrelationshipmanagement(CRM)systempeer-to-peernetworkutilitysoftwareradiofrequencyidentification(RFID)operationsmanagementwifichiefinformationofficer(CIO)supportactivitiesdata-drivendecisionmakingcommercialoff-the-shelf(COTS)Web2.0benchmarkclient-servernetworkopensourcesoftwareEthernetBluetoothcreativedestructionlocal areanetwork(LAN)powerofbuyersuser-generatedcontent(UGC)byteoperatingsystem(OS)object-orientedprogrammingstrategicenablermanagementinformationsystems(MIS)ecosystemin-memorycomputinginformationtechnology(IT)opticalscannerscentralprocessingunit (CPU)digitalsubscriberlines(DSL)coaxialcablesdata-drivendecisionmakingASCIIcodesustainingtechnologiesWiMaxbusinessprocessnetworkeffectscloudcomputinglow costleadershipstrategyprivatebranchexchange(PBX)programminglanguageenterprisearchitecture(EA)applicationsoftwarepacketswitchingbandwidthopticalcharacterrecognition(OCR)microwavetransmissione-governmentinformationsystemsoftwareswitchingcoststransistorinformationsystemsoftwarebits persecond(bps)opticalfiberrivalryamongexistingcompetitorsInternetProtocolVersion 6(IPv6)wirelessrouterdisruptiveinnovationcircuit-switchednetworke-discoverybusinessprocessmanagement(BPM)wavelengthvoiceover IP(VoIP)TCP/IPbusinessintelligenceinformation andcommunicationstechnology (ICT)competitiveadvantage

GE202 Chapter 1-3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
  1. Moore's Law
  2. threat of new entrants
  3. random access memory (RAM)
  4. computer
  5. product differentiation strategy
  6. twisted pair wires
  7. threat of substitutes
  8. primary activities
  9. hertz (Hz)
  10. legacy systems
  11. virtualization
  12. n-tier
  13. crisis management team
  14. power of suppliers
  15. network
  16. value chain model
  17. source code
  18. focused niche strategy
  19. social networking sites
  20. software as a service (SaaS)
  21. customer relationship management (CRM) system
  22. peer-to-peer network
  23. utility software
  24. radio frequency identification (RFID)
  25. operations management
  26. wifi
  27. chief information officer (CIO)
  28. support activities
  29. data-driven decision making
  30. commercial off-the-shelf (COTS)
  31. Web 2.0
  32. benchmark
  33. client-server network
  34. open source software
  35. Ethernet
  36. Bluetooth
  37. creative destruction
  38. local area network (LAN)
  39. power of buyers
  40. user-generated content (UGC)
  41. byte
  42. operating system (OS)
  43. object-oriented programming
  44. strategic enabler
  45. management information systems (MIS)
  46. ecosystem
  47. in-memory computing
  48. information technology (IT)
  49. optical scanners
  50. central processing unit (CPU)
  51. digital subscriber lines (DSL)
  52. coaxial cables
  53. data-driven decision making
  54. ASCII code
  55. sustaining technologies
  56. WiMax
  57. business process
  58. network effects
  59. cloud computing
  60. low cost leadership strategy
  61. private branch exchange (PBX)
  62. programming language
  63. enterprise architecture (EA)
  64. application software
  65. packet switching
  66. bandwidth
  67. optical character recognition (OCR)
  68. microwave transmission
  69. e-government
  70. information
  71. system software
  72. switching costs
  73. transistor
  74. information system
  75. software
  76. bits per second (bps)
  77. optical fiber
  78. rivalry among existing competitors
  79. Internet Protocol Version 6 (IPv6)
  80. wireless router
  81. disruptive innovation
  82. circuit-switched network
  83. e-discovery
  84. business process management (BPM)
  85. wavelength
  86. voice over IP (VoIP)
  87. TCP/IP
  88. business intelligence
  89. information and communications technology (ICT)
  90. competitive advantage