k_Street Consulting, LLC Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

Google.com
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Laptop Wireless Technology Insurance Save Money Audiobook IoT MSP eCommerce Quick Tips Managed IT Machine Learning Artificial Intelligence Apple Humor Passwords Administration Legal Employee/Employer Relationship Millennials Operating System Techology Private Cloud Two-factor Authentication E-Commerce Email Workers Data Recovery Mobile Device Alert Website IT Services Office How to Administrator Chrome Gmail iphone eWaste Virtualization Virtual Private Network Business Management Electronic Medical Records Hardware Shortcuts Smartphone Digital Payment Excel Firewall Business Owner WiFi Television Tip of the week Practices Software Tips Workplace Tips Google Search Data Breach Networking User Worker Commute Digital Signage Wireless Internet Entrepreneur Advertising GDPR Office Tips Solid State Drive Bandwidth Accountants Google Apps Smartwatch Security Cameras Customer Service Patch Management Windows 10 Virus Wearable Technology Money Employee Emails Telephone System Communication Chromecast Wire Unsupported Software Computer Care Government Mobile Device Management Outsourced IT Sports Access Control Smartphones Running Cable Data Storage Spam Entertainment PDF Data Backup Google Docs Hard Drives Users Software Managed IT Services Tip of the Week IT Support Cybercrime Computer Repair User Error Bluetooth Memory Social Media Innovation Mouse Fax Server Botnet Line of Business Fiber-Optic Telephone Systems Touchscreen IT Support Android IT Plan Physical Security Internet Phone System Social Networking Lithium-ion battery IaaS Computer Accessories Efficiency Miscellaneous Addiction Managed IT Services Public Cloud Content Filter Hiring/Firing travel Thought Leadership Automation Restore Data Business Continuity Network Security PowerPoint Network Cables Remote Worker Information BDR Online Shopping VoIP Statistics Bing Root Cause Analysis Remote Computing USB Thank You Business Computing Data Security Password Manager Inventory Productivity Maintenance Cybersecurity Upgrade Touchpad Streaming Media Scalability Spam Blocking Browser Printer Server Archive Workforce Voice over Internet Protocol File Sharing Customer Relationship Management Gadgets Programming IT Management Trending ISP Tablet Storage Social Analyitcs Customers Outlook Business Uninterrupted Power Supply Monitor Unified Communications App Privacy Vendor Management Screen Mirroring IBM Cryptocurrency Value Document Management Microsoft Office Telecommuting Operating Systems Hybrid Cloud Smart Technology Tablets Remote Work Environment Mobile Computing Work/Life Balance Theft Password Management Backup Microchip Experience LinkedIn Regulation Consultant Multiple Versions Applications Skype Recycling BYOD SaaS Hosted Computing Wiring Cameras Bring Your Own Device Information Technology Public Computer Cast Best Practice Windows 8 Vulnerability Printers Authentication Windows Media Player Computer Charger avoiding downtime Disaster Recovery Computing Infrastructure Technology Backup and Disaster Recovery Video Games Wireless Charging Flexibility Telephony Data storage IT Solutions Amazon Evernote Online Currency Rootkit Virtual Assistant Cost Management Password Healthcare Assessment Company Culture Benefits Smart Office Antivirus Leadership Search Law Enforcement Windows Server 2008 Safe Mode Colocation Application CES Help Desk Data Warehousing Facebook Windows 7 Infrastructure Windows Settings DDoS Fraud Big data Best Practices Mobility FENG Current Events Instant Messaging Business Intelligence Meetings Analytic IT Consultant communications Word Hacker Holiday Mobile Devices malware Automobile webinar NIST Strategy Samsung Professional Services Transportation Start Menu Hosted Solutions Paperless Office Computers Warranty Congratulations Utility Computing Content Emergency Router Google Drive Intranet Product Reviews HBO Tech Term User Tips YouTube Business Technology NarrowBand Office 365 Camera Wi-Fi Hring/Firing Project Management Retail Audit Apps Blockchain Server End of Support Scam Multi-Factor Security Compliance Internet Exlporer Pain Points Search Engine People Criminal Credit Cards Data Protection Best Available Biometrics Data Management Cleaning Unified Threat Management Robot Social Engineering Small Business Identity Theft Knowledge IT service Ransomware Managing Stress Worker Smart Tech Content Management Computer Fan Connectivity Augmented Reality Bloatware Phishing Employer-Employee Relationship Relocation Analysis Specifications OneNote WIndows 7 Marketing Shortcut Saving Money Network Congestion Books Wireless Proactive IT Cortana Black Market Amazon Web Services Point of Sale Supercomputer Managed Service Mobile Office Students Managed Service Provider Nanotechnology Content Filtering Net Neutrality Health Encryption Hosted Solution Hacking The Internet of Things Windows 10 Redundancy Windows 10s Remote Monitoring Data loss IT solutions Lifestyle Productivity Flash Reputation Distributed Denial of Service Printer Conferencing Going Green Training Saving Time Cloud VPN Data Devices CrashOverride History Employer Employee Relationship Downtime Shadow IT HVAC Remote Monitoring and Maintenance Cloud Computing Regulations Budget Mobile Gaming Console Keyboard Battery Google Tech Support Safety Loyalty Science Business Mangement Education Hackers Netflix Human Resources Risk Management Electronic Health Records Servers analytics HaaS Virtual Desktop Staff Two Factor Authentication Comparison Webinar Twitter How To Software as a Service Read Security Troubleshooting Microsoft Proactive Cache Recovery Domains Tools Enterprise Content Management Files Virtual Reality Digital Signature Collaboration Notifications Display File Versioning SharePoint Update Internet of Things Sync HIPAA Internet exploMicrosoft Save Time Music Vendor Politics Frequently Asked Questions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *