253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

What is Breadcrumb Navigation?
As per the aforementioned fairy tale, breadcrumb navigation consists of a path leading home. In this case, home is the homepage. With breadcrumb navigation, you can more easily keep track of how you got to the current web page you’re on, as well as the path back to the home page. This path can typically be viewed at the top of the page. Each step includes a link that navigates back to a specific page.

Let’s say that you’re looking at a service page on a website. If the path you took leads back to the home page, you’ll see all of the pages in between in the breadcrumbs menu. For the sake of this example, let’s say the pages in between are the second menu item and the fifth menu item. It would look something like this:

Home > [Menu 2] > [Menu Item 5]

Since these breadcrumbs are links, you can click on any one of them to be brought back to that page. This lets you continue browsing with minimal chance of getting lost on the site trying to backtrack.

More Than Just Websites
You might notice that this navigation style is similar to the ones used in toolbars in file folders or files saved on your desktop. The reason is the same--it makes finding certain files easier at a later date. The location can also be shared with others who need to know where it is.

Breadcrumbs are typically meant for helping users with browsing and organization. Are there any other features out there you can think of that do the same thing? Let us know in the comments.

The Right Data Recovery Strategy Is Important to P...
Can You Afford to Ditch Your Telephone System for ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Security Hosted Solutions Spam Data Protection Microsoft Managed IT Data Recovery Software Windows 10 Update Mobile Device Botnet Cybersecurity HVAC Mobility IT Services App Vulnerability Technology Windows 7 Bing Business Intelligence Save Money Small Business OneNote Remote Monitoring Business Mangement Content Management Avoiding Downtime Mobile Devices Millennials Smartphones Android Managed IT Services Health Employer-Employee Relationship IBM Word Access Control Hardware Marketing Artificial Intelligence Augmented Reality Data loss VoIP Phishing Mobile Device Management Unsupported Software Wire Wiring Data Supercomputer Online Managed IT Services Patch Management Virtual Assistant Virtualization Business Management Facebook Paperless Office Keyboard Miscellaneous Sports Password Manager Hacker Network Congestion Holiday Settings Communications Connectivity Digital Signage Business Computing Applications Money Privacy Scam Business Continuity Cloud Public Cloud Microsoft Office Router Password Alert Efficiency Operating System Innovation IT Consultant Printer Google IT Plan Office 365 Network Hackers Security Accountants Smartphone HBO Cleaning Vendor Identity Theft Google Search Business Windows Network Security Computer Fraud Computer Care Backup Google Drive Social Engineering Automation Windows 10 Display Criminal IT Management User Error Telephone System Servers Software as a Service Ransomware Bandwidth Wireless Charging Flexibility Blockchain Flash Wi-Fi User Tips Emails Bring Your Own Device Tip of the Week Disaster Recovery Computers Private Cloud Inventory Two-factor Authentication Work/Life Balance Data Backup Cybercrime Upgrade Law Enforcement Best Practices Comparison Telephone Systems BYOD Workplace Tips Saving Money Cortana Server Human Resources How To Managed Service Telephony VPN Data Storage Internet of Things Spam Blocking Encryption Mouse Staff Leadership Government Infrastructure Passwords Social Media Title II Communication Browser Email Collaboration Internet Safety Multi-Factor Security Tech Term Redundancy Unified Threat Management Credit Cards Google Docs CES Cloud Computing Chrome Wireless Internet Gadgets Apps Productivity Safe Mode Data Breach Help Desk Malware BDR Networking Advertising Voice over Internet Protocol Solid State Drive IT Support Information Tools Website Devices Outsourced IT Machine Learning

Newsletter Sign Up