Solved

How is this keyword list possible?

Posted on 2014-07-17
5
290 Views
Last Modified: 2014-07-17
hi, I'm going to upload a keyword list I got from the Google Keyword tool for one of our competitors. You'll see from the "extracted from" tool that the keywords all supposedly come from their home page. If I go to their home page and view source, and search for some of those keywords, they aren't there. But Google's seeing them. How do they do that? If I search our website or other competitors the same way, the keywords are extracted from all over the website, from many different pages.

I'll also upload a picture of the search I did, so you can recreate it yourself, and try it on other websites. How do they do this?

Thanks.
family-chef-kw.xlsx
Capture.JPG
0
Comment
Question by:mel200
  • 3
  • 2
5 Comments
 
LVL 58

Accepted Solution

by:
Gary earned 500 total points
ID: 40202684
Those are the keywords that Google associates with the page not necessarily what is on the page.
i.e. Someone searches for best diet food delivery plans - Google thinks that site is a relevant source of what the person wants - Google considers things other than just the keywords
For example say 100 people searched those keywords and they all went straight to that site then Google would give that site more credence to the search term for that site, of course many other things are in play besides just this single factor.
0
 

Author Comment

by:mel200
ID: 40202696
ok, thanks... I must say they are doing something right!
0
 
LVL 58

Expert Comment

by:Gary
ID: 40202712
Looking through a few more of the keywords they all seem to be on the page, maybe not the full phrase but definitely some parts of each keyword in the list.
0
 

Author Comment

by:mel200
ID: 40202738
Ok, I'll check it more thoroughly, thanks.
0
 

Author Closing Comment

by:mel200
ID: 40202933
Thanks for clearing that up.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Select distinct 25 60
FTP File permissions 1 31
reset email that plugins send alerts to 1 23
remove border from element 5 13
"In order to have an organized way for empathy mapping, we rely on a psychological model and trying to model it in a simple way, so we will split the board to three section for each persona and a scenario and try to see what those personas would Do,…
Any business that wants to seriously grow needs to keep the needs and desires of an international audience of their websites in mind. Making a website friendly to international users isn’t prohibitively expensive and can provide an incredible return…
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
Use Wufoo, an online form creation tool, to make powerful forms. Learn how to choose which pages of your form are visible to your users based on their inputs. The page rules feature provides you with an opportunity to create if:then statements for y…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now