facebook linkedin twitter

Computerware Blog

Tip of the Week: Advanced Google Searches

Tip of the Week: Advanced Google Searches

Google—the name that has become synonymous with searching online, it is (if we’re being totally honest) the go-to means of seeking out the information we need. We’ve all used it, but did you know that there are tricks to make your searches more efficient? For this week’s tip, we’ll go over these tricks so that you can use Google Search that much better.

Exact Phrase Search

Let’s say that you were seeking out a resource that contained a very specific line of words. Google gives you the capability to search for that phrase directly. Simply type it into the search bar while enclosing it in quotation marks.

So, if you wanted results that expressly said managed services, you would type in “managed services”. Easy!

Synonym Search

This tool can help when you’re unsure of the exact term that would be best to search for, but you have a general idea. By incorporating a tilde (the little squiggly line) into your search, you instruct Google to also consider synonyms of the word that follows it.

Therefore, if you were to search for ~red paint, you would also get results that involved scarlet paint, vermillion paint, cherry paint, and so on.

Website Search

There may be the time that you know that you’re looking for something on a specific website, but you’re not sure where on the website to find it. Alternatively, you might be seeking out anything related to a certain term on that website. Google gives you the means to do so with Site Search. All you need to do is add the website’s name and a colon in front of your search term.

For instance, amazon.com:red paint will deliver a results page filled with links to Amazon pages selling red paint.

Exclusionary Search

However, what if you want to search for something, but knew that it would likely kick back a bunch of results that you had no interest in? This capability allows you to proactively take results related to specific keywords out of consideration. All you need to do is add a dash in front of the terms that were to be excluded.

For example, if you were looking for a recipe, but had a few people with a peanut allergy, you could find some options by searching for recipes -peanut, or whatever ingredient that needs omission.

Range Search

If what you’re searching for falls between two numbers on a scale, Google offers a simple means of eliminating the rest of the scale from your results. For instance, let’s say you were looking for a copy of the fictional newspaper, The Exemplar Chronicle, that you knew was published between 1943 and 1947. By searching for Exemplar Chronicle 1943.. 1947, you will be presented with any results that match those specific parameters.

Multiple Query Search

Finally, Google also can search for websites containing multiple keywords at once. To do so, all you need to do is separate each query with a vertical bar, and the search engine will look for each.

So, if you wanted to seek out an IT provider that could offer proactive services and other crucial solutions, you could type in managed services | backup | data recovery, and you’d be much more likely to find the local company to serve your needs.

Of course, if comprehensive managed services are your end goal, you’ve already found the best provider available. Computerware can serve every one of your business’ technology needs. Find out more about what we offer by calling us at (703) 821-8200.

Exploring the Risk in Business VPNs
Reopening Your Business Comes with Real Challenges
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 11, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Business Management Hackers Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Managed Service Provider Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration IT Support IT Support VoIP Data Backup Quick Tips Smartphones Network Mobile Devices Business Continuity communications Microsoft Office Disaster Recovery Android Data Recovery Gadgets Social Media Cybersecurity Upgrade Mobile Office Server Communication Smartphone Virtualization Phishing Miscellaneous Mobile Device Management Vendor Management Ransomware Holiday Operating System Windows Mobile Device Outsourced IT Windows 10 Passwords Tech Term Apps Managed IT Services Users Internet of Things Remote Monitoring Facebook Unified Threat Management Automation BDR Analytics Mobile Computing BYOD Data Management Remote Computing Managed IT services Apple WiFi Windows 10 Training Artificial Intelligence History Marketing Cloud Computing The Internet of Things Browser Save Money Firewall Business Technology Help Desk Alert Big data App Encryption Spam Two-factor Authentication Health IT Consultant Office Bandwidth Managed Service Office 365 Budget Information Technology Hard Drives Going Green Gmail Government VPN Cybercrime Bring Your Own Device Antivirus Access Control Managed IT Windows 7 Maintenance Content Filtering Printer Information Computers Saving Time Covid-19 Recovery Employer-Employee Relationship Healthcare Wireless Technology Retail Search Outlook Windows 8 Cost Management Lithium-ion Battery Virus Hiring/Firing Best Practice Tech Support Customer Service Networking IBM Remote Work Augmented Reality Project Management Phone System Travel Computing Education Update Hacking Data Security It Management Humor Blockchain iPhone Data Loss Money Document Management Legal Wi-Fi Data Breach Computer Repair Running Cable Proactive IT Wireless Customer Relationship Management Regulations Storage Website PowerPoint Vendor Twitter Intranet Current Events SaaS Administration File Sharing Value Law Enforcement Password Hard Drive Applications Risk Management Solid State Drive Hacker Mobility Compliance Avoiding Downtime Data storage Save Time Conferencing Flexibility Downtime Patch Management Voice over Internet Protocol Company Culture Social Excel Telephony Social Networking DDoS Machine Learning Management Paperless Office Digital Telephone Systems Sports Websites Cooperation Vulnerabilities Disaster Hosted Solution End of Support Word Robot Software as a Service Securty Cortana Google Maps Fax Server Net Neutrality Business Intelligence Social Engineering Black Market Digital Payment Cryptocurrency Router User Meetings Laptop Tablet Virtual Desktop Business Growth Private Cloud Monitoring Scam Comparison Cleaning Monitors Redundancy Trending Office Tips Mouse How To Documents Employee/Employer Relationship Teamwork Heating/Cooling Microchip Taxes Multi-factor Authentication Evernote Managed Services Entertainment Distributed Denial of Service Managed IT Service Programming Telephone YouTube Virtual Assistant Statistics Unified Communications Settings Network Congestion Gaming Console Start Menu Tech Terms Public Cloud Licensing User Error Mobile Technology Processor Text Messaging Co-managed IT Webcam Streaming Media eWaste Identity Theft Uninterrupted Power Supply Notifications IT service Vulnerability Solutions Lifestyle Politics Distribution Bitcoin Professional Services Smart Devices Virtual Reality Data Protection Emails Chrome Processors Inbound Marketing Automobile Bluetooth Chromebook Integration USB Video Conferencing Downloads Presentation Cost Computing Infrastructure Hack Pain Points Google Docs Computer Accessories How To Memory Download Experience Managed Services Provider Specifications Safety IT Plan Enterprise Resource Planning Get More Done Google Calendar Directions Display Regulations Compliance Books Workers Legislation Error Tip of the week Recording IT Assessment Optimization LinkedIn Administrator Flash VoIP Dark Web Free Resource Digital Signature Remote Working Upselling Supercomputer Accountants A.I. Printer Server CIO Touchscreen News SSID email scam Addiction Turn Key Advertising Skype Trojan Staffing Google Wallet Consultation Processing Archive Video Surveillance Worker Windows XP Knowledge Health IT Migration Connected Devices Society Technology Tips Wasting Time Financial Data Reading Samsung Wireless Headphones Organize Displays Logistics Electronic Health Records Virtual Machines Saving ZTime Audit Bookmark Point of Contact Employer Employee Relationship Equifax Fleet Tracking Micrsooft Fake News Memes Cyber security PDF G Suite Network Management Employer/Employee Relationships Best Available Managing IT Services Keyboard Harddrive Hacks Physical Security Device security MSP Drones Data Warehousing Google Play Telephone Service Debate Banking Botnet Desktop Finance Access Managing Costs Telework Domains GPS Relocation Tablets Nanotechnology Social Network Emergency Hard Drive Disposal Microsoft 365 Surveillance Permissions Language Computer Care Browsers Remote Workers Analytic Public Speaking Startup Asset Tracking Webinar Microsoft Excel Medical IT Recycling IT Trend Micro External Harddrive Sync Business Cards Service Level Agreement User Tip Proactive Maintenance Virtual Private Network Product Reviews Shortcut CCTV Username Google Drive Windows Server 2008 Security Cameras Threats Unified Threat Management Backup and Disaster Recovery Thin CLient Business Metrics Computer Malfunction Gamification Music Spyware Mobile Payment Navigation Virtual Machine Troubleshooting FinTech Read 3D Ebay Reliable Computing Screen Reader Customer Resource management switches Writing Development Entrepreneur Electricity Printing Data Analysis Employees HIPAA Data Storage Smart Tech Upgrades eCommerce Environment Smart Phones In Internet of Things Piracy Upload Printers SQL Server Procurement Competition HTML GDPR Device Management Managing Risk Electronic Payment Fiber-Optic Database LiFi Leadership Motion Sickness Mobile Security Best Practives cache Television Tech Hypervisor Content Management Business Owner Organization Adminstration Pirating Information Scalability Telephone System Business Managemenet Trends Work/Life Balance WannaCry Fileless Malware Hybrid Cloud PCI DSS IP Address Messenger Tracking Multi-Factor Security Deep Learning Communitications Holidays Software License Corporate Profile Proxy Server Azure Supply Chain Management Application Rental Service Devices Time Management Freedom of Information Modem Strategy online Currency Human Resources Fraud Tactics Microserver Visible Light Communication Internet Service Provider Web Server UTM Content Assessment SharePoint Term Cabling IT consulting Electronic Medical Records Transportation CrashOverride Capital Personal Information Productuvuty Financial Managing Stress Regulation 3D Printing

toner1