Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Search the Web Without Typing

b2ap3_thumbnail_drag_to_search_and_others_400.jpgHow fast are you at finding the information you need using Google Search? In today’s data-driven world, knowing how to effectively use Google is actually a marketable skill. Did you know that there are ways in Google Chrome to search for what you need that take less time than typing your query in the search bar?

Click, Drag, and Drop
If you’re browsing Google Chrome and you see a word or words that you want to search for, all you have to do is highlight the text and then click, drag, and drop it into the search bar (the same bar where the URL is displayed). Upon doing this, Google will jump into action and automatically perform a search for you. It doesn’t get much easier than that.

Click and Right-Click
Then again, maybe it does. With the power of right-click, you can skip the pesky drag-and-drop thing altogether. All you have to do is highlight the text in Google Chrome that you would like Google to search for, right-click it, and then select Search Google for [...]. Surely and suddenly, Chrome will open up a new tab displaying whatever it is you’re searching for.

Have you tried out either one of these Google Search methods using Chrome before? If not, give it try by selecting any of the words on this page. For example, we think you’ll enjoy the search results after highlighting the phrase “Voyage Technology Western Kentucky managed IT” (just do us a favor and don’t select our website if you see a little yellow box saying “Ad” next to our Google listing--the cost of those Google Adwords clicks add up fast.)

Or Just Use Your Voice
Of course, at the end of the day, it doesn’t get much easier than just performing a Google search with your voice. All you have to do is go to Google’s home page and (with your microphone activated) say “OK Google.” A red microphone icon will suddenly appear and Google will anxiously await your orders. Next, tell Google whatever it is you’re looking for and your wish is its command. Just remember to speak clearly and have all other background noises toned down, or else Google will pick up on these words too, and come up with some wild and wacky search results.

There you have it. With these three Google Search methods in your arsenal, you’ll never again have to be bothered by all that pesky typing. Celebrate this achievement by kissing your bulky keyboard goodbye and tossing it in the trash... and then use one of these three Google Search methods to buy a new one, because you’re probably still going to need a keyboard for other things.

For more technology-related productivity tips, subscribe to our blog and check back with Voyage Technology’s website every week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Data Recovery Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Facebook Miscellaneous Artificial Intelligence Information Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Data Security Apps Vendor App Mobile Device Management Tip of the week Gmail WiFi Networking Chrome Employer-Employee Relationship Budget Managed Services Voice over Internet Protocol Apple BYOD Applications Avoiding Downtime Marketing Access Control Computing Conferencing Information Technology Office 365 How To BDR HIPAA Hacker Virtual Private Network Website Help Desk Health Operating System Risk Management 2FA Retail Big Data Analytics Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Computers Router Healthcare Physical Security Display Going Green Printer Free Resource Project Management Windows 7 Paperless Office Monitoring Infrastructure Cybercrime Microsoft 365 Firewall Solutions Document Management Windows 11 Telephone The Internet of Things Excel Scam Data loss Social Cooperation Patch Management Save Money Customer Service Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management iPhone Meetings VPN Wireless Technology User Tip Modem Processor Mobile Security Vulnerabilities Computer Repair Settings Images 101 Printing Word Wireless Smart Technology Multi-Factor Authentication Content Filtering Mobility Saving Time YouTube Machine Learning Cryptocurrency Managed IT Service Safety Employees Integration Downloads Supply Chain Virtual Desktop Maintenance Data storage LiFi Antivirus Licensing Entertainment Outlook Holidays Money Data Storage Humor Video Conferencing Telephone System Customer Relationship Management Managed Services Provider Cost Management Professional Services Robot Virtual Machines Sports Mouse Data Privacy Hacking Presentation Administration IT Management Network Congestion Smartwatch Best Practice Shortcuts IT Username Ransmoware Procurement Buisness User Error Azure Black Friday Legal Vendors IP Address Telework IT solutions Cyber security Database Tech IT Technicians Point of Sale CES Business Growth Be Proactive Communitications Workforce Supply Chain Management Proxy Server Cookies Cyber Monday Tech Support Threats FinTech Recovery Tactics Cortana Network Management Term Hotspot Mirgation Monitors Alt Codes Workplace Strategies Hard Drives IT Assessment Meta Domains Flexibility Downtime Value Nanotechnology Websites Amazon Organization Hosted Solution Addiction Language Chatbots Digital Security Cameras Typing Refrigeration Smart Devices Management Outsource IT Public Speaking Remote Working SharePoint Memory Screen Reader Distributed Denial of Service Electronic Medical Records Google Drive Environment Lithium-ion battery Media Data Breach Service Level Agreement Knowledge Google Play Computing Infrastructure Lenovo Entrepreneur Identity Writing Videos Electronic Health Records Small Businesses Bookmark Wasting Time Smart Tech 5G Virtual Reality Private Cloud Google Docs Displays Unified Communications Trend Micro Download Experience Server Management Security Cameras Alerts Running Cable Superfish Identity Theft Bitcoin Undo Software as a Service Google Wallet Outsourcing Browsers Managing Costs Connectivity Break Fix Twitter Error eCommerce Upload SSID Laptop Virtual Assistant Multi-Factor Security Social Engineering Windows 8 Workplace Surveillance Social Network Drones Hiring/Firing Virtual Machine IoT Dark Web Remote Computing Reviews Paperless Application Trends Medical IT Customer Resource management Halloween Transportation Regulations Tablet Google Calendar Co-managed IT Development Technology Care IBM Data Analysis Hypervisor Star Wars Microsoft Excel Alert Staff File Sharing Dark Data Shopping Business Communications Optimization Gamification Managed IT PowerPoint Scary Stories Employer/Employee Relationships Social Networking Legislation How To Hacks Scams Hybrid Work PCI DSS Fileless Malware Fun Navigation Notifications Wearable Technology Travel Gig Economy Deep Learning Human Resources Content Internet Service Provider Health IT Techology Teamwork Motherboard Google Maps Comparison Cables Competition Regulations Compliance Directions Education Assessment Evernote Permissions Unified Threat Management Google Apps Memes Net Neutrality Unified Threat Management SQL Server Specifications Mobile Computing IT Maintenance Business Intelligence Financial Data Microchip User History Internet Exlporer Search Fraud

Blog Archive