shutterstock 6840 TEST SIZE V1 051116

 

 "Experienced Analysts are ready to help you."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

Google.com
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google VoIP Data Microsoft Email Disaster Recovery Software Business nonprofit Innovation communications Internet bgc Business Continuity roundup Outsourced IT Managed IT Services IT Services User Tips Alert Hardware Smartphones Productivity Tech Term Data Backup Server Windows 10 Efficiency Managed IT Services Browser Data Recovery Smartphone Saving Money Computer Workplace Tips Cloud Computing Ransomware IT Support Internet of Things Android Cybercrime Communication Business Management Small Business Network Windows IT Support BDR Computers Miscellaneous Save Money Cybersecurity Artificial Intelligence Productivity Quick Tips Passwords Office Managed IT Gadgets Mobile Device Management Mobile Device Mobility Router Chrome Money Telephone Systems BYOD Holiday Social Engineering Windows 10 Applications Recovery Private Cloud Firewall Upgrade Law Enforcement Hacking Facebook Automation Wi-Fi Work/Life Balance Phishing Virtualization Office 365 Health Collaboration Proactive IT Vulnerability Social Media Data Protection Bring Your Own Device Budget Bandwidth Flexibility Google Drive How To Information App Compliance Office Tips Avoiding Downtime Password Managed Service Provider Remote Monitoring VPN Word Two-factor Authentication Microsoft Office Scam Settings Value Sports Apps Information Technology Connectivity Voice over Internet Protocol Software as a Service History Mobile Computing Keyboard Encryption Managed Service Black Market Data Security Servers Operating System Identity Theft Safety Data Breach Business Intelligence Redundancy HaaS Save Time Remote Computing Spam Telephony Government Unsupported Software PDF Charger Solid State Drive Data Storage Website Automobile Computing Infrastructure Marketing Electronic Medical Records Machine Learning USB IT Management Data Management Hacker Worker CES Cryptocurrency Employer-Employee Relationship Unified Threat Management Spam Blocking Battery Content Filtering Comparison Entertainment Physical Security IT Plan Wireless Technology Content Management SaaS Access Control YouTube Update Business Owner Hiring/Firing Cleaning Emergency Big Data End of Support Training Blockchain Workers Virtual Assistant WiFi Document Management Data storage Credit Cards Computer Care Patch Management Legal Human Resources Telephone System HIPAA OneNote The Internet of Things Google Docs Windows 7 Fraud Samsung Augmented Reality Infrastructure Paperless Office Risk Management Laptop Fiber-Optic Hosted Solution Supercomputer Addiction Chromecast Social Best Practice Content Customers Staff Regulation Regulations Cryptomining Amazon Search Relocation Television Smart Tech CrashOverride Printers Microchip Bluetooth Criminal Netflix NIST Hosted Computing Audit Remote Worker Professional Services Virtual Reality Files Password Manager Leadership Frequently Asked Questions Employee Telecommuting Politics Skype Touchpad Cables Transportation Current Events Cache Software Tips Vendor Audiobook Digital Signature Database Amazon Web Services How to Humor Public Computer Warranty NarrowBand Search Engine Loyalty Inventory Computer Fan Wiring Meetings Worker Commute Business Mangement HVAC Excel Digital Signage Remote Work Start Menu Unified Communications Apple Benefits Knowledge Wireless Internet Display Video Games Going Green Online Shopping Troubleshooting Devices Printer Bing Multi-Factor Security Internet Exlporer Rootkit Safe Mode Experience FENG Data loss Gmail Networking Tip of the week Google Search Scalability Accountants Windows 10s MSP Tools Theft Education iPhone Smart Technology Cortana Network Congestion Wire HBO Security Cameras Specifications Flash Evernote Thought Leadership Mouse Help Desk Trending Authentication Screen Mirroring Techology User Error Employer Employee Relationship Recycling webinar Enterprise Content Management Windows Server 2008 Net Neutrality Wireless Public Cloud File Sharing Downtime Two Factor Authentication Google Apps Smart Office Outlook Botnet Millennials Sync Wireless Charging Shadow IT Books IBM Twitter Administrator Data Warehousing Shortcuts Lifestyle Reputation Advertising Vendor Management Instant Messaging Hard Drives Assessment Nanotechnology Camera Cast Monitor Colocation Computer Accessories eWaste Conferencing Password Management ISP Practices Mobile Users Robot IT Consultant Smartwatch Workforce Business Technology GDPR Analytics E-Commerce Thank You nonprofits Biometric Security Congratulations