Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Specifying Your Google Queries

Tip of the Week: Specifying Your Google Queries

Searching for something on Google seems stunningly self-explanatory: type in what you’re looking for, press Enter, and like magic, it appears. However, there is a lot more that you can do, if you know how to use Google’s full capabilities. Let’s go over how these capabilities can be harnessed to your advantage as you perform your next search.

Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around Florida, you could type in (IT services) Florida.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: http://www.totaltechcare.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Phishing Windows Upgrade Outsourced IT Data Backup Ransomware Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Chrome Tech Term Virtualization Social Media Saving Money Gadgets Holiday Microsoft Office Automation Managed IT Services Managed Service Facebook Computers Cybercrime Artificial Intelligence Operating System Hacking Internet of Things BYOD Health Mobile Device Management Wi-Fi Networking IT Support Office 365 Telephone Systems Information Technology Remote Alert Covid-19 Spam Managed Service Provider Information Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Encryption Data Breach Applications App History Mobile Computing Law Enforcement Application Human Resources Password Money Remote Monitoring Big Data Office Tips Training Government VPN Private Cloud How To Managed IT Blockchain Remote Computing Paperless Office Apps Data Storage Patch Management Mobile Office Infrastructure Voice over Internet Protocol Google Drive Servers Flexibility Wireless Marketing WiFi Avoiding Downtime IT solutions Gmail Data Security Entertainment Website Budget Settings Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Mouse HaaS Vulnerability Windows 7 Word Education Physical Security Safety Risk Management Sports HIPAA Redundancy Hacker Vendor Management Keyboard The Internet of Things Lithium-ion battery Data Protection USB Firewall Save Time Vendor Virtual Reality Managed Services Apple Display Cleaning Staff Software as a Service Social Telephone System Conferencing Machine Learning User Error Connectivity Remote Work Employee/Employer Relationship Scam End of Support Meetings RMM Computing Identity Theft Retail IT Management Hard Drives Internet Exlporer Instant Messaging Botnet Robot Excel Virus IT Plan Biometrics PDF Augmented Reality Unified Threat Management Virtual Desktop Computer Accessories Fraud Digital Signage Unsupported Software Proactive IT Remote Worker DDoS Charger Best Practice SharePoint YouTube Compliance Cryptocurrency Black Market Procurement OneNote Computer Care Current Events Printer Workplace Strategy Net Neutrality Telephony Bluetooth Comparison Customer Service Help Desk Samsung Environment Document Management Printing CES Wireless Technology Solid State Drive Value How to Downtime Fax Server Content Management Managed Services Provider IT Consultant Spam Blocking Electronic Medical Records Business Technology Access Control SaaS Data storage Database Automobile Humor Hiring/Firing Virtual Assistant Authentication Remote Workers Computing Infrastructure Network Congestion eWaste Going Green Processor Hard Drive Update Battery Business Intelligence Shadow IT Legal Wearable Technology Google Docs Audit Worker Public Computer Administrator Ergonomics Devices Smartwatch OLED Regulations Politics Transportation Enterprise Content Management Advertising Development PCI DSS Accountants Running Cable Virtual Machine Computer Fan Rootkit MSP Microchip 2FA Thought Leadership Fiber Optics Credit Cards Notifications Employee Memory Cabling User Workers PowerPoint Benefits Password Management Windows Media Player Messaging Password Manager Policy Hypervisor Multi-Factor Security FENG IBM Search Engine Dark mode Twitter Relocation Trend Micro Business Mangement Default App Flash Managing Stress Smart Technology NIST SMS Video Games Procedure Smart Tech Saving Time Trending Science Supercomputer Cameras Worker Commute dark theme Addiction Shopping Amazon Google Search Software Tips Recycling IT Infrastructure Sync Emails Experience AI Wiring Scalability FinTech Practices Distributed Denial of Service Customer Relationship Management Bing Analyitcs Business Owner Cache Social Network Amazon Web Services Criminal NarrowBand Investment Programming Netflix Two Factor Authentication Safe Mode GDPR Search Employees Hosted Computing Employee/Employer Relationships Root Cause Analysis HBO Knowledge Printer Server Music Windows 365 Wireless Internet iPhone Online Shopping ISP Antivirus ROI Skype File Sharing Video Conferencing Camera Sales Inventory Bitcoin Specifications Shortcuts Data loss Windows 8 Outlook Leadership Troubleshooting Point of Sale Wire Files Personal Evernote IT service Cryptomining Supply Chain Management Chromecast Start Menu Travel Loyalty Printers Monitoring Batteries Millennials Screen Mirroring Tablet Frequently Asked Questions Books Windows 8.1 Smart Office Colocation Digitize Wireless Charging Domains Uninterrupted Power Supply Windows Server 2008 R2 Mobile Windows 10s Virtual Private Network Customer relationships IaaS Monitor Workforce Maintenance Cast Manufacturing Tip of the week Bloatware webinar Emergency Email Best Practices IT Assessment Cables Professional Services Public Cloud Employer Employee Relationship Assessment Project Management Computer Tips Nanotechnology Reputation Managed IT Service Telecommuting Streaming Media Security Cameras Tablets Consultant Tech Support Biometric Security Windows Server 2008 Entrepreneur Analytics Content Virtual CIO OneDrive Cortana Techology Peripheral Digital Signature Laptop Tools Best Available Television Warranty Digital Security Cameras Customers Using Data Shortcut 5G Cost Management WIndows 7 Audiobook HVAC Copiers Google Apps Quick Tip Analysis Touchpad Social Networking

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code