k_Street Consulting, LLC Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.

There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization site:azure.microsoft.com

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, July 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Best Available Hiring/Firing Windows 8 Windows 10 IT service Hardware Bring Your Own Device Troubleshooting Content Filter Tip of the week Hosted Computing Remote Worker Compliance Assessment Amazon Web Services Hacking Big data Customer Relationship Management Remote Monitoring and Maintenance Computer PDF Network Security Technology eCommerce Politics avoiding downtime Unified Threat Management Thought Leadership Retail Hackers Two Factor Authentication Virtual Desktop Humor Internet Law Enforcement Notifications The Internet of Things Instant Messaging Managed Service Cables Content Management BDR Automobile Internet exploMicrosoft Excel Data Recovery Biometrics Laptop Search Engine Uninterrupted Power Supply Application Cloud Memory Computer Accessories Quick Tips Network Recovery Ransomware Frequently Asked Questions Servers Search People Business Mangement HIPAA Running Cable Save Time Data Warehousing Mobile Devices Backup and Disaster Recovery LinkedIn Data Backup Conferencing Unsupported Software History Passwords Science Battery Email Operating Systems Data Breach Paperless Office Default App Network Congestion Microsoft Screen Mirroring Productivity Managed IT Services Administrator Cortana SaaS Healthcare Sports User Tips Printers Risk Management Comparison USB Proactive Maintenance Meetings Restore Data Colocation Windows WiFi Managed IT Services Files Cost Management Gaming Console Two-factor Authentication Worker Commute ISP Small Business Lithium-ion battery Shortcuts Managing Stress Cybersecurity Flash Windows 10s Patch Management Relocation Processor Virtual Private Network eWaste Users Nanotechnology Virtual Assistant Netflix Cryptomining MSP Employee/Employer Relationship iphone Solid State Drive IoT Smart Office Analysis Sync Maintenance Data Protection Digital Payment Employee Telephone Systems Private Cloud Tablet Smartwatch Keyboard Pain Points Evernote Biometric Security Streaming Media Remote Work Digital Signature Lifestyle Data Knowledge Efficiency End of Support Augmented Reality Infrastructure Password Manager Distributed Denial of Service HVAC File Sharing Addiction Manufacturing FENG Business Technology Bing Emergency Bloatware Multi-Factor Security Settings Audiobook Workplace Tips Touchscreen Root Cause Analysis Regulation Computing Infrastructure Telephony Content Television NIST Twitter Google Drive Internet Exlporer Audit How to Customer Service IaaS Privacy Practices Cybercrime Save Money Best Practices Chrome Virtualization Information Remote Monitoring GDPR Employer-Employee Relationship Value Cabling Cloud Computing Hring/Firing Android Charger IT solutions Business Owner Cache Managed Service Provider Credit Cards Webinar IT Support Content Filtering Enterprise Content Management Botnet Consultant NarrowBand Read Work/Life Balance Warranty Smart Tech Storage Google Docs Distribution Gmail Virus Amazon Mobile Device Management Security Hacker Hosted Solutions Digital Signage Phone System Skype Recycling User Windows Server 2008 Outlook Social Apps Entertainment SharePoint Windows Media Player Loyalty Cleaning YouTube Analyitcs Business Continuity Students Safe Mode IT Consultant Safety Environment Vendor Devices Computers Vulnerability Fax Server Scalability Vendor Management Hosted Solution Experience Wireless Internet Gadgets Theft Wiring Legal Redundancy HBO Tools BYOD Investment Social Media Cast Public Cloud Data storage Leadership Trending Printer Server Authentication OneNote Money Operating System Mobile Proactive IT Mobility Google Search Disaster Recovery Networking Business Computing Robot Apple Data Management Windows Server 2008 R2 Router Product Reviews Cameras HaaS Specifications IT Services Criminal Social Engineering Supercomputer Thank You Data Storage IBM Start Menu Books Backup Company Culture Tech Term OLED Human Resources malware Software Tips Innovation Wi-Fi Hard Drives Samsung 5G Browser Holiday File Versioning Touchpad Emails Current Events Wireless Technology CES Internet of Things Budget webinar Telecommuting Telephone System Utility Computing Virtual Reality Online Shopping Logistics Managed IT Automation Fraud Applications Spam Public Computer Office Tips App Computer Care Regulations Mobile Computing Managed Services Provider Tech Support Google IT Management Phishing Help Desk Workers Word Analytic Multiple Versions Entrepreneur WIndows 7 Upgrade ROI Microchip CrashOverride Communication DDoS Statistics Computer Fan Proactive Software as a Service Smartphone Data Security Encryption Accountants Google Apps Tip of the Week Congratulations Monitor Video Games IT Support Black Market Data loss Bluetooth Downtime Cryptocurrency Remote Computing Spam Blocking travel Online Currency User Error Domains Display Document Management Shadow IT Blockchain IT Infrastructure Database Inventory Voice over Internet Protocol Going Green How To Customers VoIP Mobile Device Firewall Business Management Connectivity Antivirus Chromecast Transportation Smart Technology Line of Business Worker Server Productivity communications Saving Time Music analytics Mouse Marketing Bandwidth Fiber-Optic Update Machine Learning Point of Sale Advertising Net Neutrality Website Office 365 Staff Software Intranet Information Technology Business Rootkit Identity Theft Camera Reputation Benefits Government Security Cameras Mobile Office Computer Repair Outsourced IT Wireless Professional Services Scam Shortcut Best Practice Wire Insurance Training Electronic Health Records Social Networking Smartphones IT Plan Education Project Management Millennials Password Physical Security Miscellaneous Flexibility Wearable Technology Artificial Intelligence IT Solutions Collaboration Saving Money Unified Communications Printer Office Hybrid Cloud Tablets Administration Employer Employee Relationship Remote Maintenance E-Commerce Access Control Windows 7 Business Intelligence Alert Techology Facebook VPN Health Password Management Wireless Charging Workforce Strategy PowerPoint Microsoft Office Windows 10 Archive Electronic Medical Records Programming

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *