253.777.0763    Get SUPPORT

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

What is Breadcrumb Navigation?
As per the aforementioned fairy tale, breadcrumb navigation consists of a path leading home. In this case, home is the homepage. With breadcrumb navigation, you can more easily keep track of how you got to the current web page you’re on, as well as the path back to the home page. This path can typically be viewed at the top of the page. Each step includes a link that navigates back to a specific page.

Let’s say that you’re looking at a service page on a website. If the path you took leads back to the home page, you’ll see all of the pages in between in the breadcrumbs menu. For the sake of this example, let’s say the pages in between are the second menu item and the fifth menu item. It would look something like this:

Home > [Menu 2] > [Menu Item 5]

Since these breadcrumbs are links, you can click on any one of them to be brought back to that page. This lets you continue browsing with minimal chance of getting lost on the site trying to backtrack.

More Than Just Websites
You might notice that this navigation style is similar to the ones used in toolbars in file folders or files saved on your desktop. The reason is the same--it makes finding certain files easier at a later date. The location can also be shared with others who need to know where it is.

Breadcrumbs are typically meant for helping users with browsing and organization. Are there any other features out there you can think of that do the same thing? Let us know in the comments.

The Right Data Recovery Strategy Is Important to P...
Can You Afford to Ditch Your Telephone System for ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Identity Theft Trending Communication Budget Business Continuity Spam Blocking Smartphone Sports Office 365 Office Website Wi-Fi VoIP Phishing Server Public Cloud HBO Managed Service Provider NIST Update Technology Email IBM Telephone System Settings Money Managing Stress Hosted Solutions IT Support Gmail Vulnerability Business Management IT Consultant Workforce Facebook Alert Small Business Infrastructure App Privacy Ransomware Chrome Two-factor Authentication Avoiding Downtime Solid State Drive Leadership Telephone Systems File Sharing Backup Cortana Redundancy OneNote Collaboration Managed IT Services VPN Samsung Business Intelligence Advertising Efficiency Flexibility eWaste Data Security Computer Data Storage Windows Passwords Emails Cloud Computing IT Services Innovation Miscellaneous Bring Your Own Device Workers Cybersecurity Word Information User Tips Health BDR Data Recovery Keyboard Operating System Windows Server 2008 Windows 10 Remote Monitoring Computers Unsupported Software Password Management Data Malware Connectivity Router Paperless Office Online Shopping Browser Network Comparison Supercomputer Safety Marketing Managed Service BYOD Internet Amazon Web Services Addiction Save Money The Internet of Things IT Plan Gadgets Camera Audit Android Google Microsoft Office Data Breach Windows 10 Internet of Things Best Practices Data Protection Quick Tips Bandwidth Private Cloud Business Recovery Windows 7 IT Management Recycling Artificial Intelligence Tech Term Hackers Managed IT Smartphones CES Net Neutrality Workplace Tips Telecommuting Hardware Applications Virtualization Screen Mirroring YouTube Cloud Nanotechnology Password Managed IT Services Tip of the week Encryption Employer-Employee Relationship Apps Google Drive How To Network Security Augmented Reality Business Computing Practices Spam Hiring/Firing Data loss Automation Authentication Virtual Assistant Skype MSP Downtime Software Digital Signature Outsourced IT Company Culture Botnet User Error Remote Work Training Mobile Device Management Law Enforcement Twitter Networking Productivity Productivity Content Management Blockchain Computer Care Communications Mobile Device Upgrade Google Apps Social Media Smart Office Saving Money Data Backup Social Engineering Security Telephony Outlook Microsoft Fraud Mobile Devices Government Scam Tip of the Week Cybercrime

Newsletter Sign Up