Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Specifying Your Google Queries

Tip of the Week: Specifying Your Google Queries

Searching for something on Google seems stunningly self-explanatory: type in what you’re looking for, press Enter, and like magic, it appears. However, there is a lot more that you can do, if you know how to use Google’s full capabilities. Let’s go over how these capabilities can be harnessed to your advantage as you perform your next search.

Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around Florida, you could type in (IT services) Florida.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: http://www.totaltechcare.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Phishing Upgrade Windows Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Gadgets Virtualization Social Media Saving Money Holiday Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Spam Office 365 Telephone Systems Alert Information Technology Information Remote Managed Service Provider Covid-19 Social Engineering Mobility BDR Employer-Employee Relationship Recovery Bandwidth Router Remote Monitoring Big Data Data Breach Law Enforcement App History Mobile Computing Password Money Application Human Resources Encryption Applications Government Private Cloud Office Tips Training Blockchain Managed IT Paperless Office How To VPN Apps Data Storage Remote Computing Patch Management Mobile Office Avoiding Downtime Servers Flexibility Marketing Wireless Data Security WiFi Bring Your Own Device IT solutions Data Management Entertainment Work/Life Balance Gmail Website Budget Settings Infrastructure Two-factor Authentication Voice over Internet Protocol Google Drive Vulnerability Mouse Windows 7 HaaS Word User Error Data Protection Meetings Employee/Employer Relationship Vendor Management RMM Risk Management Hacker Save Time The Internet of Things Lithium-ion battery Telephone System Staff Software as a Service Cleaning Machine Learning USB Connectivity Remote Work Firewall End of Support Physical Security Education Virtual Reality Vendor Apple Safety Conferencing HIPAA Managed Services Sports Display Social Redundancy Scam Keyboard IT Management Cryptocurrency Best Practice Botnet Hard Drive YouTube Black Market IT Plan Wearable Technology Retail Hard Drives Comparison Virus Instant Messaging Unsupported Software Excel CES Robot Computing Document Management Unified Threat Management Charger Computer Accessories Solid State Drive Biometrics Wireless Technology Business Technology Downtime Content Management How to Virtual Desktop Access Control Compliance Computer Care OneNote Virtual Assistant Data storage Digital Signage Current Events DDoS Automobile Telephony Authentication Samsung Printer SharePoint Bluetooth Computing Infrastructure Value Procurement Going Green Customer Service Net Neutrality Update Workplace Strategy Environment Spam Blocking Electronic Medical Records Help Desk Fax Server Printing IT Consultant Google Docs Battery Shadow IT Identity Theft Hiring/Firing Legal Humor SaaS Managed Services Provider Internet Exlporer Augmented Reality Database Network Congestion PDF Fraud Business Intelligence eWaste Remote Workers Remote Worker Worker Processor Proactive IT Audit WIndows 7 Security Cameras Recycling Public Computer Computer Tips Video Games Managed IT Service Worker Commute Shortcut OneDrive Wiring Regulations Biometric Security Practices Transportation Virtual CIO Rootkit Experience Peripheral Cost Management Cache Computer Fan Amazon Web Services Criminal Digital Security Cameras Scalability Social Networking Using Data Safe Mode Business Owner Copiers GDPR 5G Hosted Computing Workers Benefits Quick Tip Wireless Internet NarrowBand FENG Online Shopping File Sharing User Smartwatch IBM PowerPoint Windows Media Player Running Cable Ergonomics Search Development Camera iPhone Flash Memory OLED Inventory Specifications Smart Technology Evernote PCI DSS Virtual Machine Wire Fiber Optics Software Tips Managing Stress Employee Supercomputer Travel 2FA Messaging Printers Files Sync Cabling Emails Millennials Wireless Charging Cameras Policy Hypervisor Smart Office Chromecast Trend Micro Science Dark mode SMS Virtual Private Network Colocation Default App Uninterrupted Power Supply Netflix Workforce Two Factor Authentication Cables Procedure Saving Time Root Cause Analysis Customer Relationship Management Shopping Monitor HBO Google Search Knowledge Music Distributed Denial of Service dark theme AI Project Management Skype Analyitcs IT Infrastructure Nanotechnology Telecommuting Bing Cortana Printer Server FinTech Programming Data loss Social Network Reputation Outlook Digital Signature Streaming Media Leadership Troubleshooting Content Warranty Start Menu Investment Tech Support Google Apps Loyalty Antivirus Employees Techology Employee/Employer Relationships HVAC Laptop Screen Mirroring Customers Frequently Asked Questions Windows 8 ISP Analysis Books Windows 365 Audiobook IT service Video Conferencing Administrator Mobile ROI Devices Windows 10s Shortcuts Sales Bitcoin Enterprise Content Management Touchpad Cast Personal MSP Tip of the week Tablet Cryptomining Accountants webinar Emergency Point of Sale Politics Domains Supply Chain Management Microchip Advertising Professional Services Thought Leadership Public Cloud Credit Cards Employer Employee Relationship Password Manager Assessment Monitoring Batteries Password Management Maintenance Digitize Windows Server 2008 Notifications Multi-Factor Security IaaS Windows 8.1 Search Engine Tools Bloatware Windows Server 2008 R2 Twitter Consultant Business Mangement Television Analytics Customer relationships NIST IT Assessment Relocation Tablets Manufacturing Smart Tech Trending Email Best Practices Entrepreneur Addiction Best Available Amazon

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code