ROI Integrated Office Technologies Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

Google.com
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Google Network Security Productivity Software Hackers Innovation User Tips Microsoft Data Malware Backup Hardware Tech Term Mobile Devices Email Business Smartphones Internet Android Browser Business Continuity IT Services Data Backup Communications Smartphone Workplace Tips Cloud Computing Windows 10 VoIP Efficiency Computer Business Management Outsourced IT Data Recovery Computers Disaster Recovery Alert Managed IT Services Ransomware Windows 10 Managed IT Services Router Cybercrime Chrome Communication Artificial Intelligence Windows IT Support Network Miscellaneous Internet of Things Law Enforcement Cybersecurity Office Money Gadgets Password Facebook Small Business Office 365 Holiday Health Applications Social Media Virtualization Collaboration How To Wi-Fi Server Quick Tips Passwords Mobile Device Google Drive App Social Engineering BYOD Private Cloud Automation Word Saving Money Upgrade Save Money Spam BDR Mobile Device Management Telephone Systems Information SMB's Scam Apps Operating System Hacking Productivity Bring Your Own Device Microsoft Office Voice over Internet Protocol Vulnerability Settings Data Security Encryption Flexibility HaaS Work/Life Balance Connectivity Paperless Office Data Protection Phishing Mobility Two-factor Authentication Office Tips Managed Service Data Breach Battery PDF Virtual Assistant Google Docs Blockchain Computer Care Marketing Managed Service Provider Identity Theft Avoiding Downtime Bandwidth Sports Business Intelligence Telephone System Infrastructure Data Storage Hiring/Firing Entertainment Redundancy Samsung Automobile Training Big Data Remote Computing Networking Meetings Electronic Medical Records Website Human Resources IT Management Employer-Employee Relationship Public Cloud IT Support Keyboard Value Government Remote Monitoring Data Management Fraud Mobile Computing Legal USB Managed IT OneNote Firewall IT Plan Cryptocurrency Telephony End of Support Servers Charger Update CES Save Time Botnet Comparison Unsupported Software VPN Content Management Windows 7 Cleaning Spam Blocking Patch Management History Machine Learning Software as a Service Worker Augmented Reality Access Control Wire Administrator Two Factor Authentication Specifications webinar Software Tips ISP Cortana Accountants Politics Start Menu Workers Computer Fan Apple Camera Knowledge Cast Smartwatch Safety Advertising Enterprise Content Management Audiobook Flash Online Shopping IBM Thought Leadership Instant Messaging Hacker YouTube Shortcuts Employer Employee Relationship Frequently Asked Questions Rootkit The Internet of Things Authentication Video Games MSP eWaste Root Cause Analysis Education Microchip Conferencing Physical Security Cryptomining Information Technology Music Tools Assessment FENG Budget iPhone Transportation HIPAA Network Congestion Employee Password Management Evernote Windows 10s User Error Social Computer Accessories Excel Credit Cards Monitor Nanotechnology File Sharing Criminal Smart Office Computing Infrastructure Search Engine Millennials Emails Database Practices Wearable Technology Password Manager Television Users Addiction Warranty Benefits Multi-Factor Security IT Consultant Digital Signage Digital Signature NIST Sync Techology Internet Exlporer Vendor Bluetooth Tip of the week Vendor Management Smart Tech Scalability Remote Worker Emergency Recovery Supercomputer Document Management Bing Workforce Business Technology Hosted Computing Business Mangement Public Computer Cache Printer Trending Staff Leadership Google Search Wireless Hybrid Cloud Wireless Charging Loyalty Solid State Drive Data loss Display Windows Server 2008 Amazon Data storage Wiring Files Virtual Reality Help Desk HBO Telecommuting Biometric Security Proactive IT Inventory Best Practice Troubleshooting Gmail Wireless Internet Black Market Mouse Smart Technology Net Neutrality Safe Mode Risk Management Skype Google Apps SaaS Audit WiFi Current Events Screen Mirroring Security Cameras Internet exploMicrosoft HVAC Content Amazon Web Services Devices Unified Threat Management Worker Commute Outlook Remote Work Netflix Books Travel Recycling Downtime Wireless Technology 5G Tech Support Twitter Printers Competition Customer Relationship Management IP Address Company Culture Compliance Fun Customer Service Mobile Office Managing Stress Webinar Domains Regulation How to Hard Drives Search IT solutions Public Speaking CrashOverride Presentation Lithium-ion battery