XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware VoIP Productivity Mobile Office Malware Network Security Gadgets Email Quick Tips Efficiency Network Innovation IT Support Business Management IT Services Social Media Business Business Continuity Smartphones Miscellaneous Server Upgrade User Tips Virtualization Communication Disaster Recovery Communications Windows Data Backup Computer Managed IT Services Microsoft Office Data Recovery Users Smartphone Mobile Device Management Passwords Browser Android Holiday Marketing WiFi Internet of Things Save Money Alert Outsourced IT Tech Term Ransomware Cybercrime Mobile Computing Cloud Computing BDR Vendor Management Artificial Intelligence Productivity Router Windows 10 Operating System Chrome Remote Monitoring Automation Bring Your Own Device Apple BYOD Information Technology Avoiding Downtime Computers Cybersecurity Firewall Spam Going Green Telephone Systems Big Data Current Events Remote Computing Health IT Solutions VPN Managed IT Services Best Practice History The Internet of Things Collaboration Wireless Technology Printer Social Engineering Facebook IT Consultant Employer-Employee Relationship Proactive IT Application Trending Phone System Hacking Bandwidth App Lithium-ion Battery Money Mobile Device Windows 10 Office IT Support Mobility Budget Excel Mouse How To Content Filtering Networking Phishing Business Managament Private Cloud Business Intelligence Two-factor Authentication Unified Threat Management Fax Server Office 365 Maintenance Encryption Applications Recovery Windows 8 iPhone Training Google Drive Website Sports Value Managed IT User Error Information Gmail Humor Data Protection Outlook Tutorials Apps Blockchain Settings Antivirus Word Virus Redundancy PowerPoint Law Enforcement Data Security Analytics File Sharing Customer Relationship Management Save Time Hard Drives Access Control Social Inbound Marketing Office Tips Search Tablet Machine Learning Twitter Document Management Compliance Software as a Service Flexibility Analysis Streaming Media Risk Management Administration Wi-Fi Entertainment Digital Payment Social Networking Managed Service Computer Repair Retail Data Management Human Resources Saving Time Connectivity Identity Theft Vulnerability Downtime Network Congestion Hacker Administrator Voice over Internet Protocol Memory Tech Support IT Management Conferencing Servers Scam Fraud Smart Tech Samsung CES IT Plan Data storage Online Currency Data loss Touchscreen Recycling Internet Exlporer Point of Sale Content Management eWaste Unsupported Software Education PDF Spam Blocking Infrastructure Statistics HaaS End of Support Safety Paperless Office YouTube Instant Messaging Update Government Programming Business Technology Environment Skype Meetings Video Surveillance Comparison Webinar Telephony Augmented Reality Windows 7 Intranet OneNote Biometrics Google Docs Running Cable DDoS IT service Wearable Technology Solid State Drive IBM Virtual Assistant Botnet Help Desk Piracy Data Storage Leadership Net Neutrality Black Market Keyboard Healthcare Work/Life Balance Data Breach Display Credit Cards Cleaning Password Telephone System Best Available Wireless Physical Security Computer Accessories Bluetooth Public Cloud SaaS Workers USB Robot People Wire Supercomputer Microchip Frequently Asked Questions Macro Shadow IT Computer Fan Entrepreneur SharePoint Multiple Versions Content Filter Camera Workforce Co-managed IT Hybrid Cloud Cryptocurrency Tablets Professional Services Google Apps Employee Text Messaging Lifestyle IaaS Computing Infrastructure Work Station Vendor Hiring/Firing Flash Fiber-Optic Touchpad Gaming Console Authentication MSP Windows Media Player Virtual Desktop Smart Office Knowledge Tip of the week Amazon Legal Insurance FENG Cost Management Relocation Restore Data Storage IT Security Telecommuting Patch Management Safe Mode Upgrades Analyitcs Tools Monitor Digital Signage Print Server 360 HVAC Emails Security Cameras Sync Cables Nanotechnology Remote Worker Screen Mirroring Customer Service Search Engine Consultant Remote Support Windows Server 2008 Amazon Web Services Practices Electronic Medical Records nternet Crowdfunding Backup and Disaster Recovery Business Owner Addiction Virtual Private Network Software Tips Remote Work Accountants Windows 10s Password Manager Reputation Google Search Cameras Law Firm IT Internet exploMicrosoft Enterprise Content Management Employee/Employer Relationship Company Culture Unified Communications Charger Wiring Cast HIPAA Students Bing Licensing Online Shopping NarrowBand Webcam Hosted Computing Hiring/Firing Proactive Staff Cache Project Management WIndows 7 Uninterrupted Power Supply Virtual Reality LinkedIn Business Mangement Customers ISP GDPR Printer Server Shortcut Data Warehousing Specifications Advertising Hosted Solution Password Management Start Menu Theft Devices Computer Care PC Care Shortcuts User Regulations Windows 8.1 Update Evernote Chromecast Inventory Remote Monitoring and Maintenance Worker Commute Digital Signature Distributed Denial of Service Files Wireless Internet Warranty Managing Stress Domains HBO Scheduling IoT Audit Bloatware Travel Criminal File Versioning 3D Thought Leadership E-Commerce Millennials Debate Notifications NIST Netflix Science Mobile Cortana Smartwatch eBay Colocation Alerts Electronic Health Records eCommerce Wireless Charging Laptop Line of Business Root Cause Analysis Multi-Factor Security Strategy Content Techology Two Factor Authentication Regulation Emergency Music Worker Audiobook Utility Computing Assessment Printers Rootkit Politics Television Transportation Troubleshooting Webinar Battery Cryptomining Video Games Automobile Public Computer Benefits IT solutions Thank You Scalability Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Congratulations Experience How to

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *