Browse Definitions :
Definition

search string

A search string is the combination of all text, numbers and symbols entered by a user into a search engine to find desired results.

Search strings are used to find files and their content, database information and web pages. A search string may include keywords, numeric data and operators. Stop words (frequently used words such as the) are not indexed and are ignored in search queries. However, some search engines allow them to be considered in search through an inclusion operator, such as a plus sign appended to the front of the word.

Operators are search commands (often entered in capital letters) that are used to refine searches. Wildcard characters, for example, represent one or more other characters or a word. The most commonly used wildcard characters are the asterisk (*), which in Google represents zero or more characters and the question mark (?), which represents a single word. Parentheses ( ) indicate that the enclosed terms are to be searched for first.

Boolean operators allow one to specify words for inclusion and exclusion of terms and phrases in search results. For example, “apples NOT oranges” will include results with the former but exclude those with the latter. Proximity operators specify distance of two terms on the page as a requirement for returning a result. W(5), for example will limit results to pages in which the two terms are within five words of each other.

Multiple operators can be combined to fine-tune a search query.

This was last updated in August 2016

Continue Reading About search string

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close