Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Search the Web Without Typing

b2ap3_thumbnail_drag_to_search_and_others_400.jpgHow fast are you at finding the information you need using Google Search? In today’s data-driven world, knowing how to effectively use Google is actually a marketable skill. Did you know that there are ways in Google Chrome to search for what you need that take less time than typing your query in the search bar?

Click, Drag, and Drop
If you’re browsing Google Chrome and you see a word or words that you want to search for, all you have to do is highlight the text and then click, drag, and drop it into the search bar (the same bar where the URL is displayed). Upon doing this, Google will jump into action and automatically perform a search for you. It doesn’t get much easier than that.

Click and Right-Click
Then again, maybe it does. With the power of right-click, you can skip the pesky drag-and-drop thing altogether. All you have to do is highlight the text in Google Chrome that you would like Google to search for, right-click it, and then select Search Google for [...]. Surely and suddenly, Chrome will open up a new tab displaying whatever it is you’re searching for.

Have you tried out either one of these Google Search methods using Chrome before? If not, give it try by selecting any of the words on this page. For example, we think you’ll enjoy the search results after highlighting the phrase “Voyage Technology Western Kentucky managed IT” (just do us a favor and don’t select our website if you see a little yellow box saying “Ad” next to our Google listing--the cost of those Google Adwords clicks add up fast.)

Or Just Use Your Voice
Of course, at the end of the day, it doesn’t get much easier than just performing a Google search with your voice. All you have to do is go to Google’s home page and (with your microphone activated) say “OK Google.” A red microphone icon will suddenly appear and Google will anxiously await your orders. Next, tell Google whatever it is you’re looking for and your wish is its command. Just remember to speak clearly and have all other background noises toned down, or else Google will pick up on these words too, and come up with some wild and wacky search results.

There you have it. With these three Google Search methods in your arsenal, you’ll never again have to be bothered by all that pesky typing. Celebrate this achievement by kissing your bulky keyboard goodbye and tossing it in the trash... and then use one of these three Google Search methods to buy a new one, because you’re probably still going to need a keyboard for other things.

For more technology-related productivity tips, subscribe to our blog and check back with Voyage Technology’s website every week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 13 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Computer Google Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Mobile Device Ransomware Microsoft Small Business Quick Tips Backup Cybersecurity Passwords Saving Money Communication Data Backup Smartphone Managed Service Android VoIP Upgrade Business Management Smartphones Productivity communications Mobile Devices Data Recovery Disaster Recovery Browser Windows Social Media Microsoft Office Managed IT Services AI Current Events Tech Term Network Remote Internet of Things Facebook Artificial Intelligence Automation Covid-19 Cloud Computing Information Miscellaneous Holiday Gadgets Managed Service Provider Remote Work Training Server Outsourced IT Compliance Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Government IT Support Business Continuity Windows 10 Wi-Fi Blockchain Virtualization Business Technology Bandwidth Mobile Office Data Security Two-factor Authentication Vendor Apps App Mobile Device Management Networking Gmail BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Budget Apple Marketing How To BDR Computing WiFi Information Technology HIPAA Applications Office 365 Access Control Tip of the week Hacker Avoiding Downtime Conferencing Website Managed IT Services Operating System 2FA Risk Management Big Data Router Virtual Private Network Analytics Office Tips Healthcare Augmented Reality Health Help Desk Computers Storage Password Bring Your Own Device Retail Telephone Scam Solutions Data loss Going Green Cooperation Firewall Cybercrime Patch Management Windows 11 Save Money Remote Monitoring The Internet of Things Vulnerability End of Support Vendor Management Excel Social Physical Security Remote Workers Display Printer Paperless Office Infrastructure Monitoring Customer Service Free Resource Project Management Document Management Windows 7 Microsoft 365 Maintenance Antivirus Downloads Licensing Word Employees Integration Entertainment Settings Wireless Printing Content Filtering Telephone System Safety Robot Holidays YouTube Cost Management Data Storage Cryptocurrency Supply Chain Video Conferencing Managed Services Provider IT Management VPN Meetings Virtual Machines Professional Services Virtual Desktop LiFi Data storage User Tip Modem Processor Computer Repair Mobile Security Outlook Customer Relationship Management Money iPhone Humor Hacking Smart Technology Vulnerabilities Data Privacy Presentation Machine Learning Sports Saving Time Images 101 Mouse Wireless Technology Multi-Factor Authentication Mobility Managed IT Service Administration Memory Vendors Best Practice Download Twitter Alerts Remote Working Error Recovery Data Breach Google Play Be Proactive Buisness IT solutions Browsers Connectivity Videos Hard Drives Social Engineering Break Fix Electronic Health Records Legal Workforce Remote Computing Wasting Time Threats Business Growth Upload Domains Social Network Multi-Factor Security Trend Micro Security Cameras Workplace Strategies Meta Cortana Tablet IoT Refrigeration Dark Web Software as a Service Alert Managing Costs Amazon Alt Codes Trends Public Speaking Managed IT Customer Resource management Lithium-ion battery File Sharing Regulations Dark Data Google Calendar eCommerce SSID Downtime Virtual Assistant Outsource IT Hosted Solution Data Analysis Star Wars How To Microsoft Excel Surveillance Entrepreneur Notifications Staff Virtual Machine Environment Typing Media Gamification Travel Social Networking Reviews Legislation Medical IT Transportation Small Businesses Knowledge Techology Fileless Malware Google Maps Undo Development Google Drive Wearable Technology Hypervisor Displays Content 5G Health IT Unified Threat Management Motherboard Shopping Comparison Optimization PowerPoint Employer/Employee Relationships Outsourcing Unified Communications Experience Unified Threat Management Directions Assessment Permissions Google Docs PCI DSS Bitcoin Navigation Running Cable Gig Economy Application Network Congestion Specifications Google Wallet Workplace Teamwork Hiring/Firing User Error Microchip Internet Exlporer Fraud Internet Service Provider Regulations Compliance Windows 8 Evernote Paperless Laptop Username IBM Point of Sale Black Friday Memes Drones Co-managed IT SQL Server Technology Care Database Net Neutrality Tech Support IT Technicians Financial Data History Business Communications Halloween Network Management Proxy Server Cookies Smartwatch Monitors Cyber Monday IT Scams Azure Hybrid Work Tactics Competition Hotspot Procurement Websites Mirgation Telework Cyber security Hacks Tech Human Resources Scary Stories Fun Nanotechnology CES Communitications Cables Deep Learning SharePoint Addiction Electronic Medical Records Language Supply Chain Management Chatbots FinTech User Term Google Apps Management Lenovo Screen Reader Writing Distributed Denial of Service IT Assessment IT Maintenance Education Value Business Intelligence Service Level Agreement Virtual Reality Computing Infrastructure Flexibility IP Address Private Cloud Identity Organization Mobile Computing Shortcuts Server Management Search Superfish Bookmark Identity Theft Smart Tech Digital Security Cameras Smart Devices Ransmoware

Blog Archive