window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Hosted Solutions Managed IT Services Data Backup Hackers Malware VoIP Mobile Devices Data Recovery Email Data Google Outsourced IT User Tips Tech Term Internet of Things Innovation Internet Cloud Computing Microsoft Communications Backup Business Continuity Hardware IT Services Productivity Saving Money Business Efficiency Artificial Intelligence BDR Software Cybersecurity Smartphones Communication Small Business Ransomware Router Cybercrime Disaster Recovery Android Smartphone IT Support Managed IT Services Network Business Management Applications Windows 10 Chrome Workplace Tips Gadgets IT Support Browser Mobile Device Phishing Law Enforcement Managed IT Computer How To Money Mobility Information Business Intelligence Encryption Collaboration Spam Mobile Device Management BYOD Windows Two-factor Authentication Blockchain Data Security Access Control Save Money Computers Data Protection Avoiding Downtime Virtualization Office 365 Word Holiday Server Upgrade Social Media Servers Document Management Alert Machine Learning Vulnerability Managed Service Settings Compliance Training Wi-Fi Firewall Social Engineering IT Management Passwords Redundancy Analysis Apps Voice over Internet Protocol App Productivity Remote Monitoring Facebook Automation Software as a Service Proactive IT Identity Theft Private Cloud Bandwidth Telephone Systems Miscellaneous Connectivity CES Sports File Sharing Update Keyboard Unified Threat Management Credit Cards Networking Workers Botnet Content Management Work/Life Balance Save Time Fraud Business Technology OneNote Data loss Paperless Office Mobile Computing Google Docs Health Smart Tech Virtual Assistant Scam Data Breach Human Resources Employer-Employee Relationship IT Plan Hacker Spam Blocking Telephone System Google Drive Budget VPN Windows 7 Microsoft Office Infrastructure Healthcare Comparison Flexibility Solid State Drive Unsupported Software Password Value Operating System Telephony Big Data Information Technology Business Owner Website Data Storage Education Bring Your Own Device Software Tips Recovery Trending Mouse Windows 10s Hosted Computing Skype Data Management Evernote Digital Signage Leadership Netflix Enterprise Content Management Public Cloud Display Business Mangement Cortana Remote Worker Excel Millennials Wireless Help Desk Unified Communications Devices Meetings Smart Office Physical Security Lifestyle Administrator SaaS Inventory Start Menu Wireless Charging Windows 10 Google Search Addiction Data Warehousing WiFi Virtual Private Network Cleaning IoT Password Management Flash Managed Service Provider Security Cameras Current Events Gmail Wiring Strategy YouTube Tip of the week Workforce Patch Management End of Support Shortcuts Theft Thought Leadership Travel Risk Management webinar Microchip Audit Mobile Proactive Recycling Cache Project Management Office Tips Computer Care NIST Amazon Augmented Reality PDF Employee/Employer Relationship Knowledge Technology Tips GDPR Emails Windows Server 2008 Virtual Reality Telecommuting Wireless Technology eCommerce Google Apps Streaming Media Screen Mirroring Conferencing Students HBO Black Market Content Filtering HaaS Authentication Professional Services Remote Monitoring and Maintenance eWaste Wireless Internet Instant Messaging Marketing Warranty Samsung Insurance Cryptocurrency Sync Hacking Amazon Web Services The Internet of Things Smartwatch Network Congestion E-Commerce Charger Worker Commute Remote Work Social Downtime Content Filter Cast HIPAA Staff Outlook Battery Search Engine Computer Fan Fiber-Optic Nanotechnology Legal Tools Entertainment Line of Business Criminal Wire Multi-Factor Security USB Printer Practices Safe Mode Online Shopping Hard Drives Employee Electronic Medical Records IT Consultant Users Camera Accountants HVAC Regulations Vendor Password Manager Storage Remote Computing Government Digital Signature Electronic Health Records Frequently Asked Questions Specifications Computing Infrastructure Bing FENG Cables Root Cause Analysis MSP Troubleshooting Mobile Office Techology Loyalty Humor Printers Smart Technology Domains Twitter Scalability Rootkit Emergency Internet Exlporer Shadow IT Hosted Solution User Error Employer Employee Relationship Experience Public Speaking Hybrid Cloud Presentation Lithium-ion battery Content Hiring/Firing Net Neutrality Computer Accessories Music Two Factor Authentication Tech Support Quick Tips Vendor Management Company Culture 5G Fun Internet exploMicrosoft CrashOverride Politics Bluetooth Safety Utility Computing Assessment Audiobook IBM ISP Wearable Technology Files Office Webinar Managing Stress Transportation Advertising Video Games Books Competition Colocation Television Customer Relationship Management How to IP Address History Automobile Regulation Relocation IT solutions Benefits Search Worker Public Computer Best Practice Customer Service

Mobile? Grab this Article!

QR-Code dieser Seite