background preloader

Power Google

Power Google
www.google.com Welcome to Power Google, By Robert Harris, a practical, how-to book about using Google to locate information on the Internet. Below you will find a brief description of each chapter’s content along with two formats in which they can be viewed (Adobe® or HTML). If you do not have an Adobe® Acrobat® reader or would like to update your current reader to the latest version, click on the Adobe® icon below for a free download. Please note: Download times will depend on the Internet connection. Chapter 1: Why use Google? (41.0K) | or |HTML| Chapter 2: Developing a Search StrategyIf you want only a quick take on a common idea, you can simply type in the appropriate phrase into Google’s search box and quickly find your answer. (41.0K) | or |HTML| Chapter 3: Building a QueryOne of the advantages of Google’s effective method of finding and ordering pages for you is that even a simple search, such as typing in a couple of words, can produce excellent results. (42.0K) | or |HTML|

http://novella.mhhe.com/sites/0079876543/student_view0/power_google.html

Related:  GoogleDaily Trickskcmmnem

The Google Calendar Users Guide - Part I: Managing and Customizing Calendars Welcome to Part I of the Google Calendar Users Guide. This guide begins with a short overview of Google Calendars and how to get started. This User Guide then provides a comprehensive list of "How do I" answers, broken down by category, to give you the tools you need to use the calendar effectively. We discuss how how to view, manage, add, delete, and share calendars; and provide instructions regarding the many customizing options. Author: Keynote Support Click on a link below to go to that category of information, or search by keyword using Ctrl + F on a PC, and Cmd + F on a Mac.

10 Important Google URLs That Every Google User Should Know Which websites and apps have background access to my Google account? What does Google know about me? Where can I see all the ads that I’ve clicked on Google search? How To Use Google For Hacking Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1.

Beginner Google Training : The Tech Byte Packed full of Google Goodness, this Beginners Google Tools Training Camp will demonstrate the uses of free Google Applications to help in your business. This package includes recordings from each live webinar session (1 hour each) and a 50 page electronic or printable workbook with detailed instructions and screen shots. (This is from a Training Camp that was held January 2012).

21 Things You Didn't Know Your iPhone Could Do Your iPhone can do all sorts of magical things that you probably aren't aware of. Here's a list of some of the iPhone's coolest hidden features. 1. Shake to undo blog.laptopmag.com Make a mistake while typing or editing a picture? Five common errors in requirements analysis (and how to avoid them) In the traditional waterfall model of software development, the first phase of requirements analysis is also the most important one. There are a number of problems with this theoretical model, and these can cause delays and errors in the rest of the process. This article discusses some of the more common problems that project managers experience during this phase, and suggests possible solutions. This article is also available as a TechRepublic download.

How to Search Google Like a Pro: 11 Tricks You Have to Know Google is a powerful tool, but you’re missing out on a lot of that power if you just type words into it. Master Google and find the best results faster with these search tricks. Whether you’re an inexperienced user or a seasoned professional, you’ll probably find at least one search operator you weren’t aware of here. Many of Google’s search operators aren’t very well-known. Exact Words and Phrases

Why We Have Our Best Ideas in the Shower: The Science of Creativity - - The Buffer Blog “I’m not really a creative person”, always struck me as an odd sentence. Could it really be that some of us are born to be more creatively gifted than others? If so, I thought at first, that’s definitely a downer. In school, what was considered “being creative”, like writing or drawing nice pictures was never my strength. Persuasive Writing - Emotional vs Intellectual Words I have written about persuasive writing in an article where I discuss Ethos, Logos, Pathos. Persuasive writers use words to convince the reader to listen or to act. I found this useful list of words in an interesting article called Common words that suck emotional power out of your content by John Gregory Olson. He explains how words have emotions attached to them, and that you should choose the correct ones for the response you want to elicit from your reader. Use these words if you want to get an emotional, rather than an intellectual, response from your readers. Click on the link to read the full article.

Hack Attack : Find The Most Obscure MP3's Using Google photo credit: RossinaBossioB Music sharing has been of the most common file sharing activities on the internet. There are many ways you could find the music you were looking for by using tools like Limewire, BitTorrent etc.. But most times nothing beats a Google search does it? The big list of Android root applications and tools Initially, the big list of Android root applications and tools will be far from complete, as I could write for literally days before covering everything. So consider this a work in progress, check back later, and feel free to provide input. My goal here is to have a repository of the most useful Android root applications. Since there are thousands of root apps in Google Play, and tons more that never make it there, I will count on some input from you for things I have missed or things that should go away. The requirements to make this list are that the application uses root to do something other than simply request root access, and that it is not device-specific (such as turning off the triangle notification on Samsung phones). If there are a million variations of the same application (i.e.

Related: