Infracore LLC Blog

Google Search Practices That Have Purpose

Google Search Practices That Have Purpose

You could say that Google is an extremely popular website, but even that is an understatement. It’s the most visited website in the world, with 3.5 billion search queries being processed every day, and over 1.2 trillion searches a year. With so many people using Google, it’s no wonder that it’s such an advertising conglomerate, but the fact remains that this can come at the user’s detriment more often than not.
There are few resources out there that are as valuable as Google’s website. Even the act of “googling” something has become a verb. Granted, “googling” a query might not yield the results the user is expecting, which can lead to frustration. By effectively using search commands, you can make any Google search more accurate, saving time better spent actually using the plethora of knowledge you have at your fingertips.

Tip #1: Use the Tabs
Google has built-in search functionality for images, videos, news, and so much more. There are tabs for images, news, videos, maps, shopping, books, flights, and finance. You can use each of these to narrow down the results you get when you make a specific query.

#2: Use Quotes
Even if you type in what you’re looking for, Google will sometimes misconstrue what you’re looking for as something else. If you’re looking for a specific phrase, you can use quotes around it to find exactly what you’re looking for.

Example: “happy days”

The results will be the term or phrase exactly as it’s typed.

#3: Use a Hyphen to Exclude Words
Think of the hyphen as the “minus” sign of Google searches. If you have a word that you’d rather omit from a search, place a hyphen in front of it.

Example: scale -weight

By removing the topic of one of the homonyms from the equation, you will get more targeted and accurate results.

#4: Use a Colon to Search Specific Sites
If you know that what you’re searching for is found on a specific website, you can limit the search to that site with a colon.

Example: Virtualization

In the above example, you can also use a specific keyword to include it in your search.

#5: Search Locally
Google can determine your location, giving you a lot of power to find local businesses, restaurants, institutions, you name it. Just type it into Google.

Example: Laundromats nearby.

Just make sure you have your location services on if mobile. Otherwise, the search engine will use your Internet connection’s IP address to figure out what’s close to you.

What are some of your favorite ways to use Google? Let us know in the comments.

Private Cloud Challenges
3 Ways Digital Signage Pays Off


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 19 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions Productivity Internet Software Microsoft User Tips Data Malware Hackers Innovation Smartphones Hardware Mobile Devices Backup Tech Term Business Email Workplace Tips Communications Efficiency Windows 10 Data Backup Browser Business Management Business Continuity Android VoIP Smartphone IT Services Cloud Computing Small Business Computer Outsourced IT Managed IT Services Data Recovery Alert Disaster Recovery Communication Office Ransomware Chrome Computers Network Managed IT Services Miscellaneous Artificial Intelligence Router Windows 10 Social Media Collaboration Cybersecurity Cybercrime Windows Internet of Things Law Enforcement IT Support Money Telephone Systems Passwords Health How To Holiday Office 365 Password Applications Gadgets Facebook Virtualization Mobile Device Quick Tips Server Productivity Wi-Fi Information Private Cloud Social Engineering Phishing Word Google Drive Work/Life Balance Automation Saving Money Upgrade Spam App Microsoft Office Two-factor Authentication Hacking Encryption Mobile Device Management Keyboard Connectivity Mobility Paperless Office Operating System Scam Data Breach BDR Managed Service Data Security Apps HaaS Office Tips Data Protection Vulnerability Voice over Internet Protocol Training Settings IT Support Bring Your Own Device Save Money Firewall Networking Data Storage Blockchain Flexibility Identity Theft Augmented Reality PDF Meetings Update OneNote Infrastructure Save Time Employer-Employee Relationship Charger Cryptocurrency Redundancy Legal IT Management Servers Spam Blocking Automobile Patch Management Managed Service Provider Avoiding Downtime Wireless VPN Government Human Resources Cleaning IT Plan Data Management Fraud Access Control Google Docs Worker Users Big Data Public Cloud Machine Learning Comparison Staff Computer Care Virtual Assistant Unsupported Software Display Remote Monitoring Marketing Website CES Managed IT Battery Samsung Telephone System End of Support Telephony Electronic Medical Records Sports History Windows 7 Bandwidth Content Management Botnet Entertainment Software as a Service Education Business Intelligence USB Value Remote Computing BYOD Vendor Management NIST Hacker Solid State Drive Flash Online Shopping Smart Tech Camera Black Market Shortcuts Frequently Asked Questions Hosted Computing Emergency Public Computer Biometric Security iPhone Travel eWaste Bluetooth Computing Infrastructure Millennials Troubleshooting Loyalty Net Neutrality Advertising Start Menu Scalability Cache Document Management Microchip Smartwatch Relocation User Error Audit Evernote Smart Technology Current Events Multi-Factor Security HIPAA Social Excel Credit Cards Inventory Remote Worker 5G WiFi Criminal Workforce SaaS ISP Tools Password Manager Search Engine Monitor IT solutions Physical Security Experience Safe Mode Employee Computer Fan Sync Best Practice Wireless Charging Devices Two Factor Authentication Knowledge Wireless Internet Warranty Trending HVAC Vendor Tip of the week Wiring OLED Data loss Risk Management Techology Accountants Cryptomining Downtime Information Technology Business Mangement Hiring/Firing Bing Music Digital Signage Humor Internet Exlporer The Internet of Things Content Cortana Thought Leadership Network Congestion Wire Printer webinar Enterprise Content Management Files Windows 10s Windows Server 2008 Amazon Authentication Transportation Safety Unified Threat Management Screen Mirroring Search Politics Rootkit HBO Virtual Reality Telecommuting Books Assessment MSP Database Hybrid Cloud Root Cause Analysis Instant Messaging Gmail Employer Employee Relationship YouTube Help Desk Data storage Specifications Wearable Technology Google Search FENG Video Games Audiobook Google Apps IT Consultant Mouse Conferencing Software Tips Password Management Security Cameras Amazon Web Services Nanotechnology Benefits Mobile Computing Cast How to Outlook Worker Commute Remote Work Practices Television File Sharing Business Technology Apple Recovery Recycling Computer Accessories Digital Signature Proactive IT Internet exploMicrosoft Skype Workers Addiction Leadership Smart Office Administrator Emails Thank You Managing Stress Regulation Webinar Printers Congratulations CrashOverride Twitter Company Culture Compliance

Recent Comments

Sara George Tip of the Week: Locating a Misplaced Smartphone
16 April 2019
If you’re smart phone will be missed then with the software of the tracking location has to find the...
Jenna Ray What Star Wars can Teach About Mentorship
15 April 2019
There are lots of things in this world from we can learn positivity and people of this era are to ad...
Henry Lasseter What Volkswagen is Doing to Prevent Hackers From Controlling Your Car
09 April 2019
Volkswagen was doing to prevent hackers for from controlling your car it was done by the hackers. I ...
Hunter Gill Essential Cybersecurity Tips From The FBI
09 April 2019
FBI is the federal agency of the investigation the firm which investigates the cases of severe term ...
Donald Can Chargers Be Interchanged Between Devices?
02 April 2019
Technology has brought the change in our life even we can easily use it for our work. There are a lo...