XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

Google.com
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 21 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity Network Security VoIP Mobile Office Malware Email Gadgets Quick Tips Efficiency Business Management Network Innovation IT Support IT Services Social Media Smartphones Business Business Continuity Server Miscellaneous Communications Upgrade User Tips Communication Windows Virtualization Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Users Data Recovery Passwords Smartphone Browser Mobile Device Management Android Holiday Internet of Things Productivity Save Money WiFi Marketing Outsourced IT Tech Term Ransomware Alert Vendor Management Artificial Intelligence Mobile Computing Cybersecurity Cloud Computing Cybercrime Operating System BDR Router Chrome Remote Monitoring Windows 10 Bring Your Own Device Apple Computers Collaboration BYOD Automation Information Technology Remote Computing Avoiding Downtime Telephone Systems Current Events Managed IT Services Health Best Practice History Going Green Spam Big Data Firewall VPN IT Solutions The Internet of Things Wireless Technology Application IT Consultant Hacking Proactive IT Social Engineering Printer Phishing Facebook Windows 10 Employer-Employee Relationship Trending Phone System Mobility Budget Lithium-ion Battery Mobile Device Money Encryption Excel Bandwidth App Office IT Support Training Mouse Fax Server Private Cloud Content Filtering Recovery Maintenance Office 365 Windows 8 Applications How To Business Intelligence Unified Threat Management Networking Business Managament iPhone Two-factor Authentication Redundancy Value Sports Law Enforcement Save Time Apps Data Protection Blockchain Website Word PowerPoint Antivirus Access Control Google Drive User Error Gmail Analytics Managed IT Humor Data Security Outlook Tutorials Information File Sharing Settings Customer Relationship Management Virus Hard Drives Conferencing Inbound Marketing IT Management Social Managed Service Meetings Servers Paperless Office Network Congestion Hacker Business Technology Data Management Tablet Connectivity Search Administration Twitter Software as a Service Document Management Tech Support Streaming Media Risk Management Digital Payment Social Networking Education Wireless Computer Repair Scam Office Tips Saving Time Compliance Flexibility Augmented Reality Administrator Identity Theft Entertainment Machine Learning Downtime Voice over Internet Protocol Retail Memory Human Resources Analysis Wi-Fi Display Vulnerability YouTube Data Storage Biometrics Bluetooth Government Webinar People Keyboard IT service Manufacturing CES Samsung Work/Life Balance Data Breach Help Desk Fraud Virtual Private Network Touchscreen IT Plan DDoS Workers Online Currency Solid State Drive Content Management Virtual Assistant Point of Sale Black Market Recycling Infrastructure USB Unsupported Software Robot Cleaning Password Video Surveillance Data loss Physical Security Statistics Healthcare Update Telephone System Public Cloud Skype SaaS Programming Spam Blocking Piracy Comparison IBM Telephony Google Docs Staff Smart Tech Data storage Leadership Running Cable Windows 7 Intranet Botnet Cryptocurrency Wearable Technology Internet Exlporer Net Neutrality Computer Accessories Instant Messaging eWaste OneNote Environment PDF Safety Best Available Credit Cards HaaS End of Support Licensing Cortana HVAC Security Cameras Computer Care Millennials Nanotechnology Remote Worker Debate Hosted Solution Restore Data Mobile Multi-Factor Security Strategy Virtual Reality Practices Reputation Digital Signage Wireless Charging WIndows 7 Search Engine Text Messaging Accountants Work Station Frequently Asked Questions Printer Server Shortcut Addiction Gaming Console Internet exploMicrosoft Audit Professional Services Google Apps User Enterprise Content Management Employee/Employer Relationship NarrowBand Workforce Worker Commute Wiring Netflix Backup and Disaster Recovery Root Cause Analysis Lifestyle Bloatware Hosted Computing Proactive Customers Google Search Flash Fiber-Optic Managing Stress Domains Students Bing Uninterrupted Power Supply Biometric Security Science Supercomputer Tip of the week Amazon Cache Project Management Advertising Computer Fan Tools Password Management Chromecast Telecommuting Devices GDPR Distributed Denial of Service IT Security Files Cryptomining Entrepreneur Inventory Remote Monitoring and Maintenance Print Server ISP Sync Cables Shortcuts 5G Tablets IoT nternet Crowdfunding Knowledge Windows Server 2008 Amazon Web Services Wireless Internet Warranty Remote Support Notifications FENG Macro Hiring/Firing Password Manager NIST Laptop Software Tips Remote Work Windows Media Player Virtual Desktop Thought Leadership E-Commerce Webcam Colocation Patch Management Co-managed IT Database Electronic Health Records eCommerce Shadow IT Company Culture Screen Mirroring Cost Management Line of Business SharePoint Law Firm IT 360 Emails File Versioning Unified Communications OLED Upgrades Analyitcs Smartwatch Online Shopping Wire Microchip Hybrid Cloud Electronic Medical Records Distribution Business Mangement Touchpad PC Care LinkedIn Business Owner Customer Service Content Filter Camera IaaS Computing Infrastructure Windows 10s Consultant Vendor 3D Legal Charger Cast Data Warehousing Specifications Authentication MSP Scheduling Relocation Multiple Versions Start Menu Theft Digital Signature Insurance Monitor HIPAA Employee Regulations Evernote Smart Office Windows 8.1 Update eBay Hiring/Firing Logistics Travel Criminal Safe Mode Alerts HBO Cameras Storage IT solutions Employer Employee Relationship CrashOverride Battery Smart Technology Video Games Loyalty Thank You Books Experience Content Two Factor Authentication Scalability Congratulations Emergency Worker Music Audiobook How to Assessment Techology Rootkit Regulation Politics Television Transportation Troubleshooting Webinar Utility Computing Automobile Public Computer Printers Benefits

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *