Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Specifying Your Google Queries

Tip of the Week: Specifying Your Google Queries

Searching for something on Google seems stunningly self-explanatory: type in what you’re looking for, press Enter, and like magic, it appears. However, there is a lot more that you can do, if you know how to use Google’s full capabilities. Let’s go over how these capabilities can be harnessed to your advantage as you perform your next search.

Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around Florida, you could type in (IT services) Florida.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: http://www.totaltechcare.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Chrome Virtualization Tech Term Saving Money Holiday Gadgets Social Media Microsoft Office Managed Service Managed IT Services Automation Artificial Intelligence Cybercrime Computers Facebook Operating System Hacking Wi-Fi Health BYOD Mobile Device Management Networking Internet of Things IT Support Covid-19 Information Spam Office 365 Remote Telephone Systems Managed Service Provider Alert Information Technology Mobility Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Password Human Resources Money Data Breach Encryption Mobile Computing Applications Remote Monitoring Application Law Enforcement App History Big Data Paperless Office Apps Remote Computing Mobile Office Government How To Office Tips Private Cloud Training Managed IT Data Storage Blockchain VPN Patch Management Bring Your Own Device Vulnerability Settings Data Management Windows 7 Work/Life Balance Word Two-factor Authentication Flexibility Servers Marketing Infrastructure WiFi Voice over Internet Protocol Mouse IT solutions HaaS Entertainment Google Drive Website Budget Data Security Avoiding Downtime Wireless Gmail Staff Software as a Service Telephone System Cleaning Scam Machine Learning Firewall Connectivity Employee/Employer Relationship Remote Work RMM Virtual Reality Apple End of Support Vendor Management Education Physical Security Social Safety Sports User Error HIPAA Redundancy USB Meetings Keyboard Data Protection Risk Management Hacker The Internet of Things Lithium-ion battery Vendor Save Time Managed Services Conferencing Display Customer Service Environment Business Intelligence Processor Computing Infrastructure Fax Server Going Green Audit Worker Virus Hard Drive Update IT Management Unified Threat Management Computer Accessories Botnet SaaS Google Docs Battery IT Plan Shadow IT Computing Identity Theft Legal Network Congestion Unsupported Software Internet Exlporer eWaste Printer Charger Bluetooth Augmented Reality Digital Signage Fraud Compliance PDF OneNote Computer Care Current Events Remote Worker Proactive IT Telephony Wearable Technology Samsung Retail Hard Drives Cryptocurrency Best Practice Procurement IT Consultant Instant Messaging Workplace Strategy Excel YouTube Net Neutrality Robot Value Black Market Help Desk Humor Comparison Biometrics Virtual Desktop Printing Spam Blocking Electronic Medical Records CES Document Management Solid State Drive Wireless Technology DDoS Hiring/Firing How to Downtime Business Technology Managed Services Provider Content Management Access Control SharePoint Database Data storage Virtual Assistant Remote Workers Authentication Automobile Email Best Practices Tools IT Assessment Manufacturing Cables Television Monitor Computer Tips Project Management Managed IT Service Nanotechnology Security Cameras Telecommuting Antivirus Virtual CIO Windows 8 OneDrive Biometric Security Cortana User Digital Signature Public Computer PowerPoint IT service Windows Media Player Reputation Peripheral Streaming Media Digital Security Cameras Warranty Tech Support Regulations Using Data Transportation Content Techology Tablet Laptop Copiers HVAC Computer Fan 5G Google Apps Rootkit Managing Stress Analysis Domains Customers Quick Tip Ergonomics Administrator Devices Workers Smartwatch Benefits Audiobook Cameras Maintenance Touchpad Development Enterprise Content Management FENG OLED IaaS Virtual Machine Accountants IBM Bloatware PCI DSS MSP 2FA Microchip Flash Fiber Optics Thought Leadership Employee Credit Cards Smart Technology Politics Advertising Tablets Messaging Password Management Cabling Password Manager Hypervisor Supercomputer Multi-Factor Security Entrepreneur Policy Notifications Software Tips Dark mode Search Engine Sync Trend Micro Twitter Emails Printer Server Shortcut SMS NIST Default App Business Mangement Saving Time Smart Tech Trending Cost Management Relocation Procedure dark theme Shopping Addiction Netflix Google Search Amazon Two Factor Authentication Social Networking Video Games AI Root Cause Analysis IT Infrastructure Recycling HBO Practices Knowledge Bing Music Worker Commute FinTech Wiring Skype Social Network Cache Amazon Web Services Running Cable Experience Scalability Memory Safe Mode Data loss Investment Criminal Outlook Employee/Employer Relationships Hosted Computing Leadership Troubleshooting Business Owner Employees GDPR Windows 365 NarrowBand Start Menu Wireless Internet ISP Online Shopping Loyalty Search Video Conferencing File Sharing Screen Mirroring ROI Frequently Asked Questions Bitcoin Inventory Shortcuts Specifications Books iPhone Sales Camera Point of Sale Science Mobile Personal Wire Windows 10s Cryptomining Consultant Evernote Analytics Travel Supply Chain Management Cast Tip of the week Batteries webinar Millennials Emergency Files Monitoring Printers Customer Relationship Management Windows 8.1 Chromecast Professional Services Digitize Smart Office Public Cloud Best Available Wireless Charging Distributed Denial of Service Employer Employee Relationship Assessment Analyitcs Windows Server 2008 R2 WIndows 7 Virtual Private Network Uninterrupted Power Supply Windows Server 2008 Workforce Programming Colocation Customer relationships

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code