Discuss how using the Search field in the Finder Window toolbar differs from using the Search For group in the Finder window sidebar when you're trying to locate a file.

What will be an ideal response?


Using the Search field can help you find a file by name or content. Using the Search For group allows you to set any of the following parameters to narrow your search: Today, Yesterday, Past Week, All Images, All Movies, All Documents.

When you finish entering text in the Search field, the search results listed in the right pane of the Finder window will have the characters of the text you entered somewhere either in the name of the file or in the file's contents. By default, the results are listed in order of the date each file was last opened, but can easily be sorted by Name or Kind by clicking the appropriate column heading in list view.

Depending on which parameter you selected in the Search For group, Today lists all files containing your entered text that have been opened or saved today, Yesterday lists all files opened or saved yesterday, and Past Week lists all files opened or saved within the last week. All Images lists only image files, All Movies lists only video and movie files, and All Documents lists all other file types on your computer.

Computer Science & Information Technology

You might also like to view...

What is the first step in the implementation of the quality management activity?

A. Creation of a quality plan B. Creation of a quality policy C. Creation of a quality review D. Creation of a quality audit

Computer Science & Information Technology

An array of characters ending with the null terminator is called

A) a C-string. B) a C++ String. C) a string literal. D) a string class object.

Computer Science & Information Technology

The ____ attribute associates the label with the id value in the input element.

A. name B. label C. for D. input

Computer Science & Information Technology

What do administrators use to define fine-grained control over the actions a self-service user can perform when working with their virtual machines?

A. role-based security B. access control lists C. rights and permissions D. security certificates

Computer Science & Information Technology