window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

Google.com
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Hackers Malware Data Recovery Email Productivity Internet VoIP Mobile Devices Data User Tips Google Innovation Communications Internet of Things Outsourced IT Tech Term Microsoft Software Cloud Computing Backup Efficiency Cybersecurity Hardware IT Services Business Continuity Workplace Tips BDR Saving Money Artificial Intelligence Business Smartphones Business Management Communication Small Business Android Ransomware Smartphone IT Support Network Router Disaster Recovery IT Support Managed IT Services Windows 10 Cybercrime Phishing Chrome Gadgets Browser Applications Collaboration Managed IT Training Server How To Encryption Mobile Device Windows Computer Law Enforcement Word Save Money Business Intelligence Computers Money Office 365 BYOD Data Security Social Media Spam Holiday Mobility Mobile Device Management Proactive IT Information Data Protection Two-factor Authentication Avoiding Downtime Access Control Blockchain Passwords Virtualization Apps Settings Firewall Private Cloud Productivity Servers Alert Miscellaneous Connectivity Automation File Sharing Upgrade Redundancy IT Management Telephone Systems Machine Learning Social Engineering Operating System Education Bandwidth Document Management Voice over Internet Protocol Software as a Service Wi-Fi Paperless Office App Remote Monitoring Managed Service Facebook Compliance Business Technology Analysis Vulnerability Identity Theft Human Resources Password Information Technology OneNote Manufacturing Hacker Cryptocurrency Virtual Assistant Scam Budget VPN Update Microsoft Office Infrastructure Credit Cards Staff Healthcare Meetings Botnet Data Breach Telephone System Big Data Fraud Users Website Data loss Spam Blocking Mobile Computing CES Sports Business Owner Google Docs Remote Computing Bring Your Own Device Wireless Value Health Content Management IT Plan Display Keyboard Employer-Employee Relationship Windows 7 Networking Work/Life Balance Unified Threat Management Google Drive Comparison Telephony Virtual Private Network Save Time Smart Tech Workers Unsupported Software Augmented Reality Data Storage Flexibility Solid State Drive Students Current Events Root Cause Analysis Microchip Authentication Cleaning Hard Drives Frequently Asked Questions Proactive Specifications Net Neutrality Skype Project Management Evernote Marketing Insurance Software Tips Trending Employee/Employer Relationship The Internet of Things eWaste Wireless Internet Cryptomining Virtual Reality webinar Computing Infrastructure eCommerce Content Filter Audit GDPR Knowledge Fiber-Optic Nanotechnology Computer Care Excel Remote Monitoring and Maintenance Millennials ISP Black Market Content Filtering Start Menu Warranty Wireless Charging Biometric Security Hacking Practices Safe Mode Vendor Management Emails Physical Security Public Cloud Lifestyle Smartwatch Instant Messaging Criminal Wire Cortana Flash E-Commerce Database Worker Commute Accountants HVAC Conferencing Data Warehousing WiFi Social HIPAA Password Manager Storage Digital Signature Electronic Health Records Network Congestion Travel Search Engine Legal Entertainment Cables Samsung Tip of the week Line of Business Workforce File Versioning Battery Downtime Mobile Printer OLED Hosted Computing Charger Managed Service Provider Employee USB Camera Amazon Enterprise Content Management End of Support Vendor Business Mangement Computer Fan Electronic Medical Records IT Consultant Screen Mirroring Bing Unified Communications Devices Windows Server 2008 MSP Telecommuting Multiple Versions Professional Services Mouse Office Tips Data Management Inventory HBO PDF Digital Signage Recovery Windows 10 Smart Office Technology Tips Sync Quick Tips Amazon Web Services Distribution IoT Password Management Gmail Addiction FENG Strategy YouTube Leadership Cast Help Desk HaaS Theft Thought Leadership Windows 10s Remote Worker Remote Work Restore Data Tools Administrator Netflix Outlook Google Search Online Shopping Logistics NIST Multi-Factor Security Security Cameras Recycling Cache Patch Management Government Shortcuts Risk Management Wireless Technology 5G Google Apps Streaming Media SaaS Regulations Wiring Backup and Disaster Recovery History Content Safety IBM Relocation Search Music Managing Stress Computer Accessories Politics Two Factor Authentication Utility Computing Techology Audiobook Competition Customer Relationship Management CrashOverride Humor IP Address Wearable Technology Transportation Bluetooth Internet Exlporer Video Games Assessment Customer Service User Error Books Automobile Mobile Office Webinar Regulation Hybrid Cloud How to Analytics Benefits Domains Twitter Television Best Practice Hiring/Firing IT solutions Troubleshooting Printers Smart Technology Worker Fun Internet exploMicrosoft Scalability Public Speaking Public Computer Emergency Presentation Loyalty Files Lithium-ion battery Shadow IT Hosted Solution Office Rootkit Advertising Experience Tech Support Company Culture Employer Employee Relationship Colocation

Mobile? Grab this Article!

QR-Code dieser Seite