Contact us today!

FRS Pros Blog

Getting to Know Technology: Breadcrumbs

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

What is Breadcrumb Navigation?
Breadcrumb navigation is more or less what the fairy tale would suggest it is: a path that leads back home (or in this case, the homepage). It is effectively an easier way to keep track of the path to and from a certain page (or area of an application) and is often displayed at the top of the viewed page. Each step provides a link that navigates back to the page in question.

So, let’s say that you were looking at a service page on some website. If the path to that page led from the homepage, to the second menu on the homepage, to the fifth menu item in that menu, the breadcrumbs would look something like this:

Home > [Menu 2] > [Menu Item 5]

Because these breadcrumbs serve as links, clicking on the [Menu 2] breadcrumb would bring you to that menu’s page, allowing you to continue browsing from there.

More Than Just Websites
You may also recognize this style of navigation from the toolbars of the folders and files saved to your system. This just makes it easier to find certain files again later and can be shared with another user if they need to know where a file is located.

Again, breadcrumbs are specifically meant to make navigation and organization easier for the user. Can you think of any other features that do the same? Leave your thoughts in the comments!

How Much Time Do You Spend Managing Vendors?
Is It Safe to Have Your Browser Remember Your Pass...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Business Management Tech Term Google Cloud Business Computing Software User Tips Hardware Hackers Browser Computer Malware Cybersecurity Efficiency Microsoft Mobile Devices Windows Data Backup Hosted Solutions Innovation Cybercrime Productivity Apps Smartphone Windows 10 IT Services Data Recovery Smartphones Data Security Operating System Internet of Things Outsourced IT Android Office 365 Data Mobile Device Management Business Continuity Business Money Email Vulnerability Upgrade Alert VoIP Law Enforcement Phishing Ransomware IT Support Backup Microsoft Office Saving Money Managed IT Services Collaboration Network Disaster Recovery Server IT Support Best Practice Communications Chrome App Windows 10 Cloud Computing Spam Computers Virtualization Information Information Technology Passwords Telephone Systems Tech Support Gadgets Managed Service Provider Managed IT Employer-Employee Relationship Router Applications Unsupported Software Blockchain Google Drive Small Business Two-factor Authentication Hacking Safety Gmail Holiday Communication User Error Save Money Risk Management SaaS Artificial Intelligence Proactive IT Managed Service Networking Government Cortana Touchscreen Data Storage Budget Bring Your Own Device Wi-Fi WiFi Mobile Security Wireless Technology Robot Mobile Device OneNote Miscellaneous Update Data Management Politics Patch Management Wireless Charging Google Assistant Shortcut Google Docs Project Management The Internet of Things Social Media Workplace Tips Productivity Devices Audit VPN iPhone BDR Sports Data Protection Data Breach Facebook Users Automation Cost Management Managed IT Services Travel Password Quick Tips Excel Hosted Solution Application Augmented Reality Commerce Avoiding Downtime Fraud WannaCry Memory Sales Proactive Laptop Testing Tablets Maintenance Transportation IT Solutions Bandwidth Sync Evernote Webinar Private Cloud Computer Forensics Storage Social Engineering Alexa for Business FAQ Consultant Chromebook Co-Managed Services Edge Financial DDoS Retail Websites Remote Monitoring Touchpad Camera Emergency NFL Files eWaste Going Green Social Identities Disaster IT solutions Management Point of Sale Recovery Charger Printing Telephone Data Loss Ciminal Identity Theft Conferencing Data Theft Humor Projects Word Device Security iOS WIndows Server 2008 Legislation Administrator Language Vendor Adobe Workers Windows 10s HBO PowerPoint Lithium-ion battery Screen Mirroring Hyperlink Streaming Media Computer Care Nanotechnology Hybrid Cloud Vendor Management Gifts Unified Threat Management Computing Identity Windows Ink Wireless Internet Scam Comparison Access Meetings Employee-Employer Relationship Licensing Updates Solid State Drive Reputation Outlook Emails Cast History Value Microsoft Excel Chromecast IT budget Root Cause Analysis Data storage Amazon Samsung Telephony Credit Cards Upgrades App store Data Privacy Windows 7 Google Maps Spyware Computer Fan Remote Computing Health Gamification Internet Exlporer Specifications Virus Business Technology Microsoft Word Hard Disk Drive IT Management Legal Software as a Service Marketing BYOD Wireless File Sharing Settings Virtual Assistant Antivirus Uninterrupted Power Supply Mobility Hard Drive Encryption Display Apple Search Computer Accessories Cache Office tips Advertising Flexibility Music Battery Peripheral Smart Technology Instant Messaging Hacker Training Monitors CrashOverride Scalability Analytics Television Entertainment HaaS Keyboard Company Culture End of Support Black Market Cleaning Relocation Office Big Data Automobile Compliance Personal Information Managing Stress Thank You USB Printers Worker PDF How To Books Video Games Regulation Experience Mobile Computing Education Wasting Time Hiring/Firing Work/Life Balance Congratulations Virtual Reality Crowdsourcing Employer Employee Relationship Text Messaging Current Events Electronic Medical Records Phone System es Twitter Accessory Benefits Save Time