valuechainmodelnetworkeffectsinformation andcommunicationstechnology (ICT)chiefinformationofficer(CIO)threatof newentrantsradiofrequencyidentification(RFID)ASCIIcodesustainingtechnologiesbusinessprocessTCP/IPsourcecodeuser-generatedcontent(UGC)strategicenablerinformationvirtualizationinformationtechnology(IT)microwavetransmissionmanagementinformationsystems(MIS)cloudcomputingopensourcesoftwarecomputertwistedpairwiresenterprisearchitecture(EA)bits persecond(bps)focusednichestrategyswitchingcoststransistorWeb2.0legacysystemsbandwidthEthernetsystemsoftwarehertz(Hz)peer-to-peernetworklow costleadershipstrategyobject-orientedprogrammingInternetProtocolVersion 6(IPv6)applicationsoftwarewavelengthdisruptiveinnovationnetworkprimaryactivitiesMoore'sLawbusinessintelligencesoftwareas aservice(SaaS)packetswitchingin-memorycomputingrivalryamongexistingcompetitorscentralprocessingunit (CPU)data-drivendecisionmakingcommercialoff-the-shelf(COTS)e-discoveryproductdifferentiationstrategyrandomaccessmemory(RAM)privatebranchexchange(PBX)businessprocessmanagement(BPM)competitiveadvantageutilitysoftwarepower ofsuppliersprogramminglanguagecrisismanagementteambytesupportactivitiese-governmentinformationsystemopticalcharacterrecognition(OCR)local areanetwork(LAN)circuit-switchednetworkWiMaxclient-servernetworkcoaxialcablesthreat ofsubstitutesopticalfiberpowerofbuyersBluetoothcreativedestructionsoftwarewirelessrouterwifidata-drivendecisionmakingn-tierecosystemopticalscannerssocialnetworkingsitescustomerrelationshipmanagement(CRM)systemoperationsmanagementdigitalsubscriberlines(DSL)voiceover IP(VoIP)operatingsystem(OS)benchmarkvaluechainmodelnetworkeffectsinformation andcommunicationstechnology (ICT)chiefinformationofficer(CIO)threatof newentrantsradiofrequencyidentification(RFID)ASCIIcodesustainingtechnologiesbusinessprocessTCP/IPsourcecodeuser-generatedcontent(UGC)strategicenablerinformationvirtualizationinformationtechnology(IT)microwavetransmissionmanagementinformationsystems(MIS)cloudcomputingopensourcesoftwarecomputertwistedpairwiresenterprisearchitecture(EA)bits persecond(bps)focusednichestrategyswitchingcoststransistorWeb2.0legacysystemsbandwidthEthernetsystemsoftwarehertz(Hz)peer-to-peernetworklow costleadershipstrategyobject-orientedprogrammingInternetProtocolVersion 6(IPv6)applicationsoftwarewavelengthdisruptiveinnovationnetworkprimaryactivitiesMoore'sLawbusinessintelligencesoftwareas aservice(SaaS)packetswitchingin-memorycomputingrivalryamongexistingcompetitorscentralprocessingunit (CPU)data-drivendecisionmakingcommercialoff-the-shelf(COTS)e-discoveryproductdifferentiationstrategyrandomaccessmemory(RAM)privatebranchexchange(PBX)businessprocessmanagement(BPM)competitiveadvantageutilitysoftwarepower ofsuppliersprogramminglanguagecrisismanagementteambytesupportactivitiese-governmentinformationsystemopticalcharacterrecognition(OCR)local areanetwork(LAN)circuit-switchednetworkWiMaxclient-servernetworkcoaxialcablesthreat ofsubstitutesopticalfiberpowerofbuyersBluetoothcreativedestructionsoftwarewirelessrouterwifidata-drivendecisionmakingn-tierecosystemopticalscannerssocialnetworkingsitescustomerrelationshipmanagement(CRM)systemoperationsmanagementdigitalsubscriberlines(DSL)voiceover IP(VoIP)operatingsystem(OS)benchmark

GE202 Chapter 1-3 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
  1. value chain model
  2. network effects
  3. information and communications technology (ICT)
  4. chief information officer (CIO)
  5. threat of new entrants
  6. radio frequency identification (RFID)
  7. ASCII code
  8. sustaining technologies
  9. business process
  10. TCP/IP
  11. source code
  12. user-generated content (UGC)
  13. strategic enabler
  14. information
  15. virtualization
  16. information technology (IT)
  17. microwave transmission
  18. management information systems (MIS)
  19. cloud computing
  20. open source software
  21. computer
  22. twisted pair wires
  23. enterprise architecture (EA)
  24. bits per second (bps)
  25. focused niche strategy
  26. switching costs
  27. transistor
  28. Web 2.0
  29. legacy systems
  30. bandwidth
  31. Ethernet
  32. system software
  33. hertz (Hz)
  34. peer-to-peer network
  35. low cost leadership strategy
  36. object-oriented programming
  37. Internet Protocol Version 6 (IPv6)
  38. application software
  39. wavelength
  40. disruptive innovation
  41. network
  42. primary activities
  43. Moore's Law
  44. business intelligence
  45. software as a service (SaaS)
  46. packet switching
  47. in-memory computing
  48. rivalry among existing competitors
  49. central processing unit (CPU)
  50. data-driven decision making
  51. commercial off-the-shelf (COTS)
  52. e-discovery
  53. product differentiation strategy
  54. random access memory (RAM)
  55. private branch exchange (PBX)
  56. business process management (BPM)
  57. competitive advantage
  58. utility software
  59. power of suppliers
  60. programming language
  61. crisis management team
  62. byte
  63. support activities
  64. e-government
  65. information system
  66. optical character recognition (OCR)
  67. local area network (LAN)
  68. circuit-switched network
  69. WiMax
  70. client-server network
  71. coaxial cables
  72. threat of substitutes
  73. optical fiber
  74. power of buyers
  75. Bluetooth
  76. creative destruction
  77. software
  78. wireless router
  79. wifi
  80. data-driven decision making
  81. n-tier
  82. ecosystem
  83. optical scanners
  84. social networking sites
  85. customer relationship management (CRM) system
  86. operations management
  87. digital subscriber lines (DSL)
  88. voice over IP (VoIP)
  89. operating system (OS)
  90. benchmark