Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Search the Web Without Typing

b2ap3_thumbnail_drag_to_search_and_others_400.jpgHow fast are you at finding the information you need using Google Search? In today’s data-driven world, knowing how to effectively use Google is actually a marketable skill. Did you know that there are ways in Google Chrome to search for what you need that take less time than typing your query in the search bar?

Click, Drag, and Drop
If you’re browsing Google Chrome and you see a word or words that you want to search for, all you have to do is highlight the text and then click, drag, and drop it into the search bar (the same bar where the URL is displayed). Upon doing this, Google will jump into action and automatically perform a search for you. It doesn’t get much easier than that.

Click and Right-Click
Then again, maybe it does. With the power of right-click, you can skip the pesky drag-and-drop thing altogether. All you have to do is highlight the text in Google Chrome that you would like Google to search for, right-click it, and then select Search Google for [...]. Surely and suddenly, Chrome will open up a new tab displaying whatever it is you’re searching for.

Have you tried out either one of these Google Search methods using Chrome before? If not, give it try by selecting any of the words on this page. For example, we think you’ll enjoy the search results after highlighting the phrase “Voyage Technology Western?Kentucky managed IT” (just do us a favor and don’t select our website if you see a little yellow box saying “Ad” next to our Google listing--the cost of those Google Adwords clicks add up fast.)

Or Just Use Your Voice
Of course, at the end of the day, it doesn’t get much easier than just performing a Google search with your voice. All you have to do is go to Google’s home page and (with your microphone activated) say “OK Google.” A red microphone icon will suddenly appear and Google will anxiously await your orders. Next, tell Google whatever it is you’re looking for and your wish is its command. Just remember to speak clearly and have all other background noises toned down, or else Google will pick up on these words too, and come up with some wild and wacky search results.

There you have it. With these three Google Search methods in your arsenal, you’ll never again have to be bothered by all that pesky typing. Celebrate this achievement by kissing your bulky keyboard goodbye and tossing it in the trash... and then use one of these three Google Search methods to buy a new one, because you’re probably still going to need a keyboard for other things.

For more technology-related productivity tips, subscribe to our blog and check back with Voyage Technology’s website every week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Email Workplace Tips Phishing Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Passwords Communication Data Backup Saving Money Smartphone Backup Android Managed Service Business Management VoIP Smartphones Mobile Devices communications Upgrade Disaster Recovery Browser Data Recovery Social Media Microsoft Office Windows Managed IT Services Current Events Network Remote Productivity Tech Term Internet of Things Facebook Automation Artificial Intelligence Gadgets AI Covid-19 Cloud Computing Holiday Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Information Compliance Encryption Spam Employee/Employer Relationship Training Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology IT Support Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Managed Services Mobile Device Management Voice over Internet Protocol Chrome Gmail Budget WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Free Resource The Internet of Things Scam Project Management Data loss Windows 7 Social Cooperation Microsoft 365 Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Physical Security Windows 11 Display Printer 2FA Paperless Office Excel Infrastructure Monitoring Remote Workers Firewall Document Management Telephone Data Privacy Mouse Licensing Images 101 Entertainment Administration Multi-Factor Authentication Mobility Robot Telephone System Customer Relationship Management Cost Management Employees Settings Printing Wireless Integration Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Holidays Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Data Storage Supply Chain Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Professional Services Word Smart Technology Outlook Machine Learning Money Saving Time Humor iPhone Managed IT Service Safety Maintenance Sports Downloads Vulnerabilities Antivirus Browsers Education Connectivity Social Engineering Break Fix Supply Chain Management FinTech Term Google Apps Upload Remote Computing Multi-Factor Security IT Assessment IT Maintenance Mobile Computing Social Network Value Business Intelligence Tablet IoT Search Dark Web Flexibility Organization Shortcuts Application Best Practice Trends Alert Buisness File Sharing Regulations Digital Security Cameras Dark Data Google Calendar Smart Devices Ransmoware Managed IT Customer Resource management Memory Vendors IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Remote Working Data Breach Google Play Be Proactive Business Growth Gamification Notifications Staff Travel Social Networking Videos Legislation Electronic Health Records Workforce Wasting Time Threats Techology Fileless Malware Google Maps Cortana Trend Micro Security Cameras Workplace Strategies Alt Codes Content Wearable Technology Health IT Downtime Unified Threat Management Motherboard Comparison Software as a Service Meta Competition Managing Costs Amazon Unified Threat Management Directions Hosted Solution Assessment Permissions eCommerce SSID Typing Network Congestion Specifications Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Google Drive User Error Microchip Media User Internet Exlporer Knowledge Fraud Reviews Medical IT Username Point of Sale 5G Black Friday Development Transportation Small Businesses Hypervisor Displays IP Address Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians Shopping Optimization PowerPoint Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Employer/Employee Relationships Outsourcing Navigation Recovery Tactics Hotspot PCI DSS Laptop Websites Mirgation Gig Economy Workplace Hard Drives Windows 8 Domains Drones Nanotechnology Internet Service Provider Teamwork Hiring/Firing Regulations Compliance SharePoint Evernote Paperless Addiction Electronic Medical Records Language Halloween Chatbots Memes Co-managed IT Refrigeration Management SQL Server Technology Care Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Net Neutrality Financial Data History Lithium-ion battery Business Communications Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Smartwatch IT Scams Hacks Server Management Azure Hybrid Work Superfish Bookmark Identity Theft Smart Tech Fun Procurement Telework Cyber security Tech Human Resources Deep Learning Download Twitter Alerts Error CES Communitications Cables Undo

Blog Archive