Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Specifying Your Google Queries

Tip of the Week: Specifying Your Google Queries

Searching for something on Google seems stunningly self-explanatory: type in what you’re looking for, press Enter, and like magic, it appears. However, there is a lot more that you can do, if you know how to use Google’s full capabilities. Let’s go over how these capabilities can be harnessed to your advantage as you perform your next search.

Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around Florida, you could type in (IT services) Florida.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: http://www.totaltechcare.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Phishing Upgrade Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Cloud Computing Office Data Recovery Passwords Windows 10 Tech Term Chrome Virtualization Saving Money Holiday Gadgets Social Media Managed Service Microsoft Office Managed IT Services Automation Cybercrime Operating System Computers Facebook Artificial Intelligence Health Hacking Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Managed Service Provider Spam Office 365 Telephone Systems Remote Information Technology Alert Information Covid-19 Social Engineering Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Human Resources Password Data Breach Money Big Data Encryption Remote Monitoring Applications Mobile Computing App Law Enforcement History Application Apps Remote Computing Mobile Office How To Government Office Tips Training Private Cloud Blockchain Paperless Office Data Storage VPN Patch Management Managed IT Work/Life Balance Two-factor Authentication Infrastructure Voice over Internet Protocol Servers Mouse HaaS Google Drive Flexibility Data Security Marketing WiFi Avoiding Downtime IT solutions Entertainment Website Wireless Budget Gmail Vulnerability Settings Windows 7 Bring Your Own Device Word Data Management Cleaning Virtual Reality Employee/Employer Relationship Apple RMM Vendor Management End of Support Social Education Physical Security Safety User Error Sports Meetings HIPAA Data Protection Redundancy Keyboard Risk Management Hacker USB The Internet of Things Lithium-ion battery Save Time Vendor Software as a Service Conferencing Telephone System Staff Managed Services Machine Learning Display Scam Connectivity Remote Work Firewall Computing Infrastructure IT Management Google Docs Going Green Hard Drive Identity Theft Botnet SaaS IT Plan Battery Network Congestion Computing Unsupported Software Shadow IT eWaste Augmented Reality Legal Fraud Charger Virus Internet Exlporer Remote Worker Compliance OneNote Unified Threat Management Computer Care Computer Accessories Current Events Cryptocurrency Digital Signage PDF Telephony Wearable Technology Hard Drives Retail Samsung Proactive IT Instant Messaging Comparison Robot Excel Procurement Best Practice Value YouTube Printer Workplace Strategy Biometrics CES Net Neutrality Bluetooth Black Market Spam Blocking Virtual Desktop Electronic Medical Records Help Desk Business Technology Printing Content Management DDoS Hiring/Firing Access Control Document Management Wireless Technology SharePoint Virtual Assistant Solid State Drive Authentication Managed Services Provider How to IT Consultant Downtime Database Data storage Humor Customer Service Environment Remote Workers Automobile Business Intelligence Update Processor Audit Fax Server Worker IT service Public Computer Computer Tips HVAC Managed IT Service Google Apps Security Cameras Consultant Regulations Analytics Virtual CIO Transportation OneDrive Analysis Biometric Security Devices Tablet Reputation Computer Fan Streaming Media Administrator Rootkit Peripheral Domains Digital Security Cameras Enterprise Content Management Using Data Content Best Available Tech Support WIndows 7 Laptop Workers MSP Benefits Copiers Accountants 5G Techology Thought Leadership Credit Cards Customers IaaS FENG Microchip Maintenance Quick Tip IBM Ergonomics Password Management Bloatware Audiobook Password Manager Smartwatch Multi-Factor Security Flash Touchpad Smart Technology Development OLED Twitter Tablets Virtual Machine Search Engine PCI DSS Supercomputer 2FA NIST Entrepreneur Fiber Optics Politics Business Mangement Employee Advertising Software Tips User Trending Sync PowerPoint Emails Windows Media Player Messaging Smart Tech Cabling Addiction Hypervisor Amazon Notifications Shortcut Policy Dark mode Cost Management Trend Micro Recycling Managing Stress Netflix Wiring Social Networking Two Factor Authentication SMS Practices Default App Procedure Cache Saving Time Amazon Web Services Relocation Root Cause Analysis Cameras Knowledge dark theme Safe Mode Music Shopping Criminal Google Search HBO IT Infrastructure Video Games Skype Running Cable GDPR AI Hosted Computing FinTech Wireless Internet Memory Worker Commute Online Shopping Bing Data loss Outlook Leadership File Sharing Troubleshooting Social Network Experience Investment Scalability Specifications Start Menu Camera Inventory Loyalty Employees Wire Employee/Employer Relationships Business Owner Evernote Screen Mirroring Frequently Asked Questions NarrowBand Printer Server Windows 365 Books ISP Travel ROI Search Millennials Mobile Windows 10s Printers Video Conferencing Science Sales Smart Office Bitcoin Wireless Charging Shortcuts iPhone Cast Tip of the week webinar Point of Sale Emergency Personal Cryptomining Workforce Professional Services Distributed Denial of Service Public Cloud Virtual Private Network Customer Relationship Management Employer Employee Relationship Supply Chain Management Assessment Monitoring Analyitcs Batteries Cables Files Windows Server 2008 Chromecast Windows 8.1 Programming Digitize Nanotechnology Windows Server 2008 R2 Telecommuting Tools Project Management Television Customer relationships Cortana Colocation Uninterrupted Power Supply Antivirus Email Best Practices IT Assessment Digital Signature Manufacturing Windows 8 Monitor Warranty

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code