Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Performing a search in Gmail is as simple as using the search bar at the top of the screen, just above the inbox. You can use this search feature for a basic inbox search, but there are options that allow for more comprehensive searches. Here are three steps that you can take to perform better Gmail searches for your missing or desired messages.

First, enter your search results in the search bar. If you don’t find your desired messages, click the down arrow:

ib 1

A window will pop up that allows you to sort through your messages according to certain criteria, like sender, receiver, subject, keywords, etc. You can also omit certain results by taking advantage of the “Doesn’t have,” field. Use these checkboxes to determine whether or not the messages have attachments, or you can apply a range for size or date to help you narrow down the search results.

One of the most notable features of Gmail’s search function is the top button that defaults to “All Mail.” By clicking it, you’ll be provided several options that you can use to search through specific parts of your Gmail account, including inbox, sent messages, spam, and trash. This helps to make sure that you don’t miss messages in the future.

ib 2

If there are messages in your spam or trash that match your search, Gmail will display a message underneath your inbox that says, “Some messages in Trash or Spam match your search. View messages.” By clicking the link, you’ll be shown the messages.

These updates to Gmail only apply to the web application at this time, as more comprehensive search functions aren’t currently available on the mobile application. That doesn’t mean they won’t arrive in the near future, though.

For more great tips, be sure to subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 26 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Privacy Email Phishing Google Workplace Tips Computer Users IT Services Collaboration Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Small Business Workplace Strategy Microsoft Data Backup Communication Smartphone Saving Money Business Management Smartphones VoIP Android Mobile Devices communications Backup Data Recovery Passwords Managed IT Services Managed Service Upgrade Browser Social Media Microsoft Office Disaster Recovery Tech Term Network Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Remote Work Managed Service Provider Windows Miscellaneous Gadgets Server Current Events Outsourced IT Information Productivity Employee/Employer Relationship Holiday Spam Encryption Windows 10 AI Government Data Management Business Continuity Compliance Office Windows 10 Training Virtualization Business Technology Blockchain Wi-Fi Two-factor Authentication Bandwidth Apps Data Security Mobile Office Mobile Device Management Gmail Chrome Budget Managed Services Voice over Internet Protocol Apple Employer-Employee Relationship App Vendor Networking BYOD Office 365 Conferencing WiFi Access Control Tip of the week Hacker How To Applications Avoiding Downtime Computing BDR Information Technology Help Desk Analytics Office Tips Virtual Private Network Augmented Reality Health Storage Password Big Data Bring Your Own Device Healthcare Retail HIPAA Computers Router Managed IT Services Operating System Website Risk Management Marketing Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Firewall Display IT Support Printer Telephone The Internet of Things Paperless Office Infrastructure Remote Workers Social Cooperation Document Management Windows 11 Free Resource 2FA Project Management Scam Going Green Customer Service Windows 7 Data loss Excel Microsoft 365 Cybercrime Solutions Patch Management Save Money Smart Technology Word Data Privacy Virtual Desktop Data storage IT Management LiFi VPN Holidays Saving Time Meetings Physical Security Outlook Data Storage Managed IT Service Computer Repair Money Video Conferencing Safety Downloads Humor Managed Services Provider Virtual Machines Professional Services Licensing Entertainment Sports Mouse Machine Learning iPhone Administration Telephone System Cost Management Customer Relationship Management Vulnerabilities Maintenance Antivirus Supply Chain Images 101 Hacking Multi-Factor Authentication Presentation Settings Mobility Wireless Printing Content Filtering Wireless Technology User Tip Modem YouTube Mobile Security Processor Employees Cryptocurrency Robot Integration Google Docs Unified Communications Managing Costs Hard Drives Human Resources Experience Mirgation Bitcoin eCommerce Domains Unified Threat Management Cables Running Cable SSID Nanotechnology Virtual Assistant Addiction Language Unified Threat Management Google Wallet Surveillance Virtual Machine Refrigeration Management Google Apps Chatbots Network Congestion Distributed Denial of Service Reviews Windows 8 Public Speaking IT Maintenance Laptop Medical IT Screen Reader Business Intelligence Transportation Service Level Agreement Computing Infrastructure User Error Drones Development Lithium-ion battery Hypervisor Shortcuts Entrepreneur Identity Smart Tech Shopping Optimization Bookmark Point of Sale Ransmoware Halloween PowerPoint Vendors Employer/Employee Relationships Download Alerts PCI DSS Network Management Undo Tech Support Be Proactive Navigation Connectivity Monitors Break Fix Gig Economy Hacks Browsers Workforce Scary Stories Threats Teamwork Upload Fun Internet Service Provider Multi-Factor Security Regulations Compliance Deep Learning Social Network Websites Workplace Strategies Evernote IoT Dark Web Memes Meta Amazon Education SQL Server Application Trends Electronic Medical Records SharePoint Net Neutrality Google Calendar Financial Data History Customer Resource management Regulations Star Wars Writing Microsoft Excel Smartwatch Lenovo Mobile Computing IT IBM Data Analysis Outsource IT Environment Azure Gamification Virtual Reality Media Search Staff Procurement Legislation Telework Server Management Best Practice Cyber security Private Cloud Tech Social Networking CES Superfish Communitications Fileless Malware Identity Theft Small Businesses Buisness Displays IT solutions Content Twitter Wearable Technology Legal Supply Chain Management Comparison FinTech Business Growth Competition Health IT Error Term Motherboard Assessment Social Engineering Permissions IT Assessment Directions Outsourcing Flexibility Value Remote Computing Cortana Specifications Organization Alt Codes Workplace Downtime User Internet Exlporer Fraud Digital Security Cameras Smart Devices Microchip Tablet Hiring/Firing Remote Working Hosted Solution Memory Username Alert Paperless Black Friday Managed IT Typing Data Breach File Sharing Co-managed IT Google Play Dark Data Technology Care Database How To Videos Electronic Health Records IP Address Google Drive Wasting Time Notifications Business Communications Knowledge IT Technicians Cyber Monday Trend Micro Proxy Server Travel Scams Security Cameras Cookies Hybrid Work Recovery Tactics 5G Hotspot Techology Software as a Service Google Maps

Blog Archive