network crisis management team application software cloud computing ecosystem e- government sustaining technologies value chain model source code focused niche strategy customer relationship management (CRM) system operating system (OS) twisted pair wires software information technology (IT) benchmark computer ASCII code competitive advantage Internet Protocol Version 6 (IPv6) wifi legacy systems product differentiation strategy central processing unit (CPU) business process business intelligence commercial off-the- shelf (COTS) switching costs system software information creative destruction low cost leadership strategy strategic enabler optical fiber n-tier microwave transmission Bluetooth Ethernet packet switching digital subscriber lines (DSL) virtualization disruptive innovation data- driven decision making bits per second (bps) power of suppliers support activities local area network (LAN) information and communications technology (ICT) in- memory computing rivalry among existing competitors wireless router Web 2.0 byte threat of new entrants optical character recognition (OCR) business process management (BPM) random access memory (RAM) open source software optical scanners bandwidth network effects management information systems (MIS) enterprise architecture (EA) TCP/IP voice over IP (VoIP) Moore's Law client- server network radio frequency identification (RFID) data- driven decision making utility software e- discovery primary activities information system user- generated content (UGC) threat of substitutes private branch exchange (PBX) coaxial cables chief information officer (CIO) object- oriented programming circuit- switched network software as a service (SaaS) transistor WiMax peer-to- peer network hertz (Hz) operations management programming language wavelength power of buyers social networking sites network crisis management team application software cloud computing ecosystem e- government sustaining technologies value chain model source code focused niche strategy customer relationship management (CRM) system operating system (OS) twisted pair wires software information technology (IT) benchmark computer ASCII code competitive advantage Internet Protocol Version 6 (IPv6) wifi legacy systems product differentiation strategy central processing unit (CPU) business process business intelligence commercial off-the- shelf (COTS) switching costs system software information creative destruction low cost leadership strategy strategic enabler optical fiber n-tier microwave transmission Bluetooth Ethernet packet switching digital subscriber lines (DSL) virtualization disruptive innovation data- driven decision making bits per second (bps) power of suppliers support activities local area network (LAN) information and communications technology (ICT) in- memory computing rivalry among existing competitors wireless router Web 2.0 byte threat of new entrants optical character recognition (OCR) business process management (BPM) random access memory (RAM) open source software optical scanners bandwidth network effects management information systems (MIS) enterprise architecture (EA) TCP/IP voice over IP (VoIP) Moore's Law client- server network radio frequency identification (RFID) data- driven decision making utility software e- discovery primary activities information system user- generated content (UGC) threat of substitutes private branch exchange (PBX) coaxial cables chief information officer (CIO) object- oriented programming circuit- switched network software as a service (SaaS) transistor WiMax peer-to- peer network hertz (Hz) operations management programming language wavelength power of buyers social networking sites
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
network
crisis management team
application software
cloud computing
ecosystem
e-government
sustaining technologies
value chain model
source code
focused niche strategy
customer relationship management (CRM) system
operating system (OS)
twisted pair wires
software
information technology (IT)
benchmark
computer
ASCII code
competitive advantage
Internet Protocol Version 6 (IPv6)
wifi
legacy systems
product differentiation strategy
central processing unit (CPU)
business process
business intelligence
commercial off-the-shelf (COTS)
switching costs
system software
information
creative destruction
low cost leadership strategy
strategic enabler
optical fiber
n-tier
microwave transmission
Bluetooth
Ethernet
packet switching
digital subscriber lines (DSL)
virtualization
disruptive innovation
data-driven decision making
bits per second (bps)
power of suppliers
support activities
local area network (LAN)
information and communications technology (ICT)
in-memory computing
rivalry among existing competitors
wireless router
Web 2.0
byte
threat of new entrants
optical character recognition (OCR)
business process management (BPM)
random access memory (RAM)
open source software
optical scanners
bandwidth
network effects
management information systems (MIS)
enterprise architecture (EA)
TCP/IP
voice over IP (VoIP)
Moore's Law
client-server network
radio frequency identification (RFID)
data-driven decision making
utility software
e-discovery
primary activities
information system
user-generated content (UGC)
threat of substitutes
private branch exchange (PBX)
coaxial cables
chief information officer (CIO)
object-oriented programming
circuit-switched network
software as a service (SaaS)
transistor
WiMax
peer-to-peer network
hertz (Hz)
operations management
programming language
wavelength
power of buyers
social networking sites