SlideShare a Scribd company logo
By Munpreet Marbay
Search Operators
Report
By Munpreet Marbay
Content
Introduction……………………………………………Page 3
Examples of Search operators…………………….Page 4,5
Summary………………………………………………Page 6
Conclusion…………………………………………….Page 6
Bibliography………………………………………….Page7
By Munpreet Marbay
Introduction
This report will cover the various search techniques that can
benefit the user when researching different topics. There are 5
main techniques that can optimise research; this report will
include various examples.
Search operators are used to narrow down specific terms or even
broaden the term to make researching easier.
By Munpreet Marbay
Examples of Search Operators
1) Quotation marks: (“____”)
Quotation marks are used to search words as a specific phrase,
so when researching the phrase within the quotation marks will
be searched together rather than separate.
Examples: “Boris Johnson”, “Galaxy Chocolate”, “Brown Bags”
2) Wild Card Search (*)
When researching we may forget part of the phrases or words,
so using the Wild Card symbol allows you to research relevant
content online if you have forgotten parts of the phrase or letter
when spelling.
Examples: “Azerba*”: Azerbaijan, “Wh*”: When, Where, who
3) Excluding Words (-)
When researching, we could find information we do not
need, so a good technique of researching is using the minus
symbol to exclude any words you don’t want to search.
Examples: “Hotels –UK”, “Women’s Shoes –Yellow”, “Mini
Cooper –Blue”
By Munpreet Marbay
4) Defining a Term (:)
When trying to define a word, it is quicker to use the define
symbol instead of writing out a sentence. When using search
engines such as Google, Google will have their own
definition.
Examples: “Define:blog”, “Define:Irony”, “Define:Dibersity”
5) Required Words (+)
When searching, we may get unwanted information, to save
time and look for the related content you need the required
word symbol makes searching quick, as it searched the
required word within the search engine.
Examples: “Horse+farm”, “Hotels +USA”, “Coffe+Costa”
By Munpreet Marbay
Summary
Search operators are an efficient technique when
researching a particular topic as it allows you to gather the
relevant information rather than scrolling through
Unrelated information. “Wild Card” search operator helps
users to gather relevant content if they have forgotten the
specific term or spelling. “Quotation Marks” tells the search
engine to search the phrase together rather than the
separate. “Excluding Words”, helps the user to search certain
content without having a specific word when researching.
“Defining a word”, this technique allows the user to search a
definition quickly without having to type the sentence within
Google. “Required Words” this helps the user to gather
specific information using the key words.
Conclusion
Having used the search operators for the first time, I found
using them a bit tedious, as I have never needed to use them
when researching a particular topic, also to benefit from
using the search operators, you would have to learn them.
However they are useful when researching certain topics and
also make researching more accurate, so gathering the
correct information is simple.
By Munpreet Marbay
Bibliography
http://jwebnet.net/advancedgooglesearch.html
https://support.google.com/vault/answer/2474474?hl=en
http://www.googleguide.com/advanced_operators_reference.html
http://www.open.ac.uk/infoskills-researchers/search-techniques.htm
By Munpreet Marbay

More Related Content

Similar to Search Operators

Digital literacy
Digital literacyDigital literacy
Digital literacy
Kenia Bustamante
 
Effective Searching: Part 3 - Narrow your search (Generic Web)
Effective Searching: Part 3 - Narrow your search (Generic Web)Effective Searching: Part 3 - Narrow your search (Generic Web)
Effective Searching: Part 3 - Narrow your search (Generic Web)
Jamie Bisset
 
Search engine optimization
Search engine optimizationSearch engine optimization
Search engine optimization
University of peshawar
 
Online research and research skills
Online research and research skillsOnline research and research skills
Online research and research skills
Live Angga
 
Lost in the net: Navigating search engines
Lost in the net:  Navigating search enginesLost in the net:  Navigating search engines
Lost in the net: Navigating search enginesJohan Koren
 
Quality not quantity
Quality not quantityQuality not quantity
Quality not quantityvanesz
 
IS Audit Course- Final Project ppt
IS Audit Course- Final Project pptIS Audit Course- Final Project ppt
IS Audit Course- Final Project ppt
Shahzeb Pirzada
 
All About keywords.pptx
All About keywords.pptxAll About keywords.pptx
All About keywords.pptx
QaziMuhammadShoaibAl
 
EFFECTIVELY WAY INFORMATION SEARCH .pptx
EFFECTIVELY WAY INFORMATION SEARCH .pptxEFFECTIVELY WAY INFORMATION SEARCH .pptx
EFFECTIVELY WAY INFORMATION SEARCH .pptx
Christopher Mkono
 
Content Creation Tips from Ahrefs.com
Content Creation Tips from Ahrefs.comContent Creation Tips from Ahrefs.com
Content Creation Tips from Ahrefs.com
Webdesy.com
 
Contextualized Online Search and Research Skills.pptx
Contextualized Online Search and Research Skills.pptxContextualized Online Search and Research Skills.pptx
Contextualized Online Search and Research Skills.pptx
RouAnnNavarroza
 
Knoweldge-Repository-Academic-Searching-Techniques.ppt
Knoweldge-Repository-Academic-Searching-Techniques.pptKnoweldge-Repository-Academic-Searching-Techniques.ppt
Knoweldge-Repository-Academic-Searching-Techniques.ppt
SHABNAMK8
 
SharePoint Search Zero to Search Hero - SPSNL 2016
SharePoint Search Zero to Search Hero - SPSNL 2016SharePoint Search Zero to Search Hero - SPSNL 2016
SharePoint Search Zero to Search Hero - SPSNL 2016
Ed Musters
 
Effective Searching: Part 3 - Narrow your search (Web Version)
Effective Searching: Part 3 - Narrow your search (Web Version)Effective Searching: Part 3 - Narrow your search (Web Version)
Effective Searching: Part 3 - Narrow your search (Web Version)
Jamie Bisset
 
working of search engine & SEO
working of search engine & SEOworking of search engine & SEO
working of search engine & SEO
Deepak Singh
 
Keyword Mastery: Keyword Research for Beginners
Keyword Mastery: Keyword Research for BeginnersKeyword Mastery: Keyword Research for Beginners
Keyword Mastery: Keyword Research for BeginnersMowbray Publishing Ltd
 

Similar to Search Operators (20)

Search Engines
Search EnginesSearch Engines
Search Engines
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Effective Searching: Part 3 - Narrow your search (Generic Web)
Effective Searching: Part 3 - Narrow your search (Generic Web)Effective Searching: Part 3 - Narrow your search (Generic Web)
Effective Searching: Part 3 - Narrow your search (Generic Web)
 
Search engine optimization
Search engine optimizationSearch engine optimization
Search engine optimization
 
Online research and research skills
Online research and research skillsOnline research and research skills
Online research and research skills
 
Lost in the net: Navigating search engines
Lost in the net:  Navigating search enginesLost in the net:  Navigating search engines
Lost in the net: Navigating search engines
 
Quality not quantity
Quality not quantityQuality not quantity
Quality not quantity
 
IS Audit Course- Final Project ppt
IS Audit Course- Final Project pptIS Audit Course- Final Project ppt
IS Audit Course- Final Project ppt
 
All About keywords.pptx
All About keywords.pptxAll About keywords.pptx
All About keywords.pptx
 
EFFECTIVELY WAY INFORMATION SEARCH .pptx
EFFECTIVELY WAY INFORMATION SEARCH .pptxEFFECTIVELY WAY INFORMATION SEARCH .pptx
EFFECTIVELY WAY INFORMATION SEARCH .pptx
 
Databasepowerpoint.pptx1
Databasepowerpoint.pptx1Databasepowerpoint.pptx1
Databasepowerpoint.pptx1
 
Jabnernako
JabnernakoJabnernako
Jabnernako
 
Jabnernako
JabnernakoJabnernako
Jabnernako
 
Content Creation Tips from Ahrefs.com
Content Creation Tips from Ahrefs.comContent Creation Tips from Ahrefs.com
Content Creation Tips from Ahrefs.com
 
Contextualized Online Search and Research Skills.pptx
Contextualized Online Search and Research Skills.pptxContextualized Online Search and Research Skills.pptx
Contextualized Online Search and Research Skills.pptx
 
Knoweldge-Repository-Academic-Searching-Techniques.ppt
Knoweldge-Repository-Academic-Searching-Techniques.pptKnoweldge-Repository-Academic-Searching-Techniques.ppt
Knoweldge-Repository-Academic-Searching-Techniques.ppt
 
SharePoint Search Zero to Search Hero - SPSNL 2016
SharePoint Search Zero to Search Hero - SPSNL 2016SharePoint Search Zero to Search Hero - SPSNL 2016
SharePoint Search Zero to Search Hero - SPSNL 2016
 
Effective Searching: Part 3 - Narrow your search (Web Version)
Effective Searching: Part 3 - Narrow your search (Web Version)Effective Searching: Part 3 - Narrow your search (Web Version)
Effective Searching: Part 3 - Narrow your search (Web Version)
 
working of search engine & SEO
working of search engine & SEOworking of search engine & SEO
working of search engine & SEO
 
Keyword Mastery: Keyword Research for Beginners
Keyword Mastery: Keyword Research for BeginnersKeyword Mastery: Keyword Research for Beginners
Keyword Mastery: Keyword Research for Beginners
 

More from MKM16

Idea’s for the horror movie
Idea’s for the horror movieIdea’s for the horror movie
Idea’s for the horror movieMKM16
 
Audience feedback for film poster and film magazine
Audience feedback for film poster and film magazineAudience feedback for film poster and film magazine
Audience feedback for film poster and film magazineMKM16
 
Typeface magazine
Typeface magazineTypeface magazine
Typeface magazineMKM16
 
Typeface magazine
Typeface magazineTypeface magazine
Typeface magazineMKM16
 
Typefaces for the movie poster
Typefaces for the movie posterTypefaces for the movie poster
Typefaces for the movie posterMKM16
 
Typefaces for the movie poster
Typefaces for the movie posterTypefaces for the movie poster
Typefaces for the movie posterMKM16
 
Photo shoot for film poster
Photo shoot for film posterPhoto shoot for film poster
Photo shoot for film posterMKM16
 
Photo shoot for film poster
Photo shoot for film posterPhoto shoot for film poster
Photo shoot for film posterMKM16
 
Audience Research for Movie Poster
Audience Research for Movie PosterAudience Research for Movie Poster
Audience Research for Movie PosterMKM16
 
Distraught character analysis
Distraught character analysisDistraught character analysis
Distraught character analysisMKM16
 
Idea’s for the horror movie
Idea’s for the horror movieIdea’s for the horror movie
Idea’s for the horror movieMKM16
 
Production Meeting
Production MeetingProduction Meeting
Production MeetingMKM16
 
Production logo
Production logoProduction logo
Production logoMKM16
 
Idea’s for the horror movie
Idea’s for the horror movieIdea’s for the horror movie
Idea’s for the horror movieMKM16
 
Test shots
Test shotsTest shots
Test shotsMKM16
 
Distraught character analysis
Distraught character analysisDistraught character analysis
Distraught character analysisMKM16
 
Distraught character analysis
Distraught character analysisDistraught character analysis
Distraught character analysisMKM16
 
Production Meetings
Production MeetingsProduction Meetings
Production MeetingsMKM16
 
Production logo
Production logoProduction logo
Production logoMKM16
 
Designing intertitles
Designing intertitlesDesigning intertitles
Designing intertitlesMKM16
 

More from MKM16 (20)

Idea’s for the horror movie
Idea’s for the horror movieIdea’s for the horror movie
Idea’s for the horror movie
 
Audience feedback for film poster and film magazine
Audience feedback for film poster and film magazineAudience feedback for film poster and film magazine
Audience feedback for film poster and film magazine
 
Typeface magazine
Typeface magazineTypeface magazine
Typeface magazine
 
Typeface magazine
Typeface magazineTypeface magazine
Typeface magazine
 
Typefaces for the movie poster
Typefaces for the movie posterTypefaces for the movie poster
Typefaces for the movie poster
 
Typefaces for the movie poster
Typefaces for the movie posterTypefaces for the movie poster
Typefaces for the movie poster
 
Photo shoot for film poster
Photo shoot for film posterPhoto shoot for film poster
Photo shoot for film poster
 
Photo shoot for film poster
Photo shoot for film posterPhoto shoot for film poster
Photo shoot for film poster
 
Audience Research for Movie Poster
Audience Research for Movie PosterAudience Research for Movie Poster
Audience Research for Movie Poster
 
Distraught character analysis
Distraught character analysisDistraught character analysis
Distraught character analysis
 
Idea’s for the horror movie
Idea’s for the horror movieIdea’s for the horror movie
Idea’s for the horror movie
 
Production Meeting
Production MeetingProduction Meeting
Production Meeting
 
Production logo
Production logoProduction logo
Production logo
 
Idea’s for the horror movie
Idea’s for the horror movieIdea’s for the horror movie
Idea’s for the horror movie
 
Test shots
Test shotsTest shots
Test shots
 
Distraught character analysis
Distraught character analysisDistraught character analysis
Distraught character analysis
 
Distraught character analysis
Distraught character analysisDistraught character analysis
Distraught character analysis
 
Production Meetings
Production MeetingsProduction Meetings
Production Meetings
 
Production logo
Production logoProduction logo
Production logo
 
Designing intertitles
Designing intertitlesDesigning intertitles
Designing intertitles
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Search Operators

  • 1. By Munpreet Marbay Search Operators Report
  • 2. By Munpreet Marbay Content Introduction……………………………………………Page 3 Examples of Search operators…………………….Page 4,5 Summary………………………………………………Page 6 Conclusion…………………………………………….Page 6 Bibliography………………………………………….Page7
  • 3. By Munpreet Marbay Introduction This report will cover the various search techniques that can benefit the user when researching different topics. There are 5 main techniques that can optimise research; this report will include various examples. Search operators are used to narrow down specific terms or even broaden the term to make researching easier.
  • 4. By Munpreet Marbay Examples of Search Operators 1) Quotation marks: (“____”) Quotation marks are used to search words as a specific phrase, so when researching the phrase within the quotation marks will be searched together rather than separate. Examples: “Boris Johnson”, “Galaxy Chocolate”, “Brown Bags” 2) Wild Card Search (*) When researching we may forget part of the phrases or words, so using the Wild Card symbol allows you to research relevant content online if you have forgotten parts of the phrase or letter when spelling. Examples: “Azerba*”: Azerbaijan, “Wh*”: When, Where, who 3) Excluding Words (-) When researching, we could find information we do not need, so a good technique of researching is using the minus symbol to exclude any words you don’t want to search. Examples: “Hotels –UK”, “Women’s Shoes –Yellow”, “Mini Cooper –Blue”
  • 5. By Munpreet Marbay 4) Defining a Term (:) When trying to define a word, it is quicker to use the define symbol instead of writing out a sentence. When using search engines such as Google, Google will have their own definition. Examples: “Define:blog”, “Define:Irony”, “Define:Dibersity” 5) Required Words (+) When searching, we may get unwanted information, to save time and look for the related content you need the required word symbol makes searching quick, as it searched the required word within the search engine. Examples: “Horse+farm”, “Hotels +USA”, “Coffe+Costa”
  • 6. By Munpreet Marbay Summary Search operators are an efficient technique when researching a particular topic as it allows you to gather the relevant information rather than scrolling through Unrelated information. “Wild Card” search operator helps users to gather relevant content if they have forgotten the specific term or spelling. “Quotation Marks” tells the search engine to search the phrase together rather than the separate. “Excluding Words”, helps the user to search certain content without having a specific word when researching. “Defining a word”, this technique allows the user to search a definition quickly without having to type the sentence within Google. “Required Words” this helps the user to gather specific information using the key words. Conclusion Having used the search operators for the first time, I found using them a bit tedious, as I have never needed to use them when researching a particular topic, also to benefit from using the search operators, you would have to learn them. However they are useful when researching certain topics and also make researching more accurate, so gathering the correct information is simple.