253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

What is Breadcrumb Navigation?
As per the aforementioned fairy tale, breadcrumb navigation consists of a path leading home. In this case, home is the homepage. With breadcrumb navigation, you can more easily keep track of how you got to the current web page you’re on, as well as the path back to the home page. This path can typically be viewed at the top of the page. Each step includes a link that navigates back to a specific page.

Let’s say that you’re looking at a service page on a website. If the path you took leads back to the home page, you’ll see all of the pages in between in the breadcrumbs menu. For the sake of this example, let’s say the pages in between are the second menu item and the fifth menu item. It would look something like this:

Home > [Menu 2] > [Menu Item 5]

Since these breadcrumbs are links, you can click on any one of them to be brought back to that page. This lets you continue browsing with minimal chance of getting lost on the site trying to backtrack.

More Than Just Websites
You might notice that this navigation style is similar to the ones used in toolbars in file folders or files saved on your desktop. The reason is the same--it makes finding certain files easier at a later date. The location can also be shared with others who need to know where it is.

Breadcrumbs are typically meant for helping users with browsing and organization. Are there any other features out there you can think of that do the same thing? Let us know in the comments.

The Right Data Recovery Strategy Is Important to P...
Can You Afford to Ditch Your Telephone System for ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Encryption Google Search Display Software Relocation Data Smartphones Human Resources Computers Google Docs Malware Comparison Backup Small Business Data Storage Operating System Apps Criminal Hardware Update Information Computer Health OneNote Files Frequently Asked Questions Settings Scam Fraud Wiring Privacy Private Cloud Knowledge Firewall Tip of the Week Start Menu Users Collaboration Bing Credit Cards CES Quick Tips Social Engineering Software as a Service Wireless Internet Business Management Safe Mode Facebook Blockchain Cloud Machine Learning Cybercrime Mobile Device Ransomware User Tips Business Computing Applications Android Networking Mobile Devices How To Warranty Telephone Systems Staff Business Intelligence Sports Flash Managed IT Remote Monitoring Data Management Vulnerability Servers Botnet Proactive IT Workplace Tips Inventory Bring Your Own Device Disaster Recovery Avoiding Downtime Security Automation Data Security Spam Passwords HaaS Business Title II BYOD FENG Chrome Password End of Support Smartphone Two-factor Authentication Internet of Things Tech Term Specifications Default App Hybrid Cloud Browser Telephone System Training Server IT Services Alert Content Management BDR Google Artificial Intelligence Data Backup Saving Money Meetings IT Management Managed IT Services Google Drive Miscellaneous Evernote Keyboard Windows 10 Microsoft Telephony Money Windows 7 Apple IT Support Cloud Computing Emergency Network Mobile Device Management Government Paperless Office Virtual Assistant Social Media Printer Humor Virtualization Hosted Solutions Infrastructure Net Neutrality IT Plan Technology Unsupported Software Wi-Fi Data Protection Best Practices Managed IT Services Outsourced IT Microsoft Office Password Manager Bandwidth Redundancy Business Continuity Router Augmented Reality Data Breach Efficiency Network Security Windows 10 Upgrade App Netflix Productivity Current Events Hackers Save Money Access Control Innovation HIPAA Office 365 Communications Internet Data Recovery Root Cause Analysis Voice over Internet Protocol Biometric Security Charger Word Windows Website Cache Communication Connectivity VPN Employer-Employee Relationship Email Cast Spam Blocking Public Cloud Vendor Identity Theft webinar Wireless Phishing Holiday Gadgets VoIP Cryptocurrency Cybersecurity Managed Service Law Enforcement

Newsletter Sign Up