Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“Find” the Secrets Behind the Ctrl +F and Ctrl + G Keyboard Shortcuts

“Find” the Secrets Behind the Ctrl +F and Ctrl + G Keyboard Shortcuts

The Ctrl + F keyboard shortcut is incredibly useful, especially when you need to find specific text on a page… but did you know it is capable of so much more than that? Today, we want to go over some specific use cases for this keyboard shortcut and how you can use them in Google Docs and Microsoft Word.

What Does the Basic Keyboard Shortcut Do?

First, you can open the Find window by using the Ctrl + F keyboard shortcut. You’ll see a text field open where you can type in a search query. This will populate results for the chosen word or phrase. You can also jump between instances of the word or phrase by hitting the arrow buttons in the window.

Regardless of whether you prefer Word or Docs, this functionality will be there. The replace feature, though, is a whole other story.

How the Replace Feature Works

The Replace feature in Google Docs is accessed from the Find menu. Use the Ctrl + F shortcut, then click the three-dot menu in the search box.

From here, you’ll see the options in the Find column, but also those for the Replace function. You can replace all instances of a word with anything you wish. You can use a blanket replacement or replace a single instance; it’s up to you. You can also set the function to be case-sensitive or look for special characters, too.

In Microsoft Word, it works a bit differently. Use the Ctrl + G shortcut to open the Replace feature.

Most of these options will look like they do in Google Docs, including the Find and Replace box. Click on More >> to see more checkboxes for specific situations, like capital letters, prefixes, suffixes, whole words, and even white space. It’s obviously a little more dynamic than Google Docs, but that’s hardly a bad thing.

We Have Loads of Tips for You

If you’re looking for more technology tricks, our blog is chock-full of them for technology and business topics. Go ahead and check them out, and come back for even more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Passwords Backup Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Productivity Upgrade Android Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office AI Managed IT Services Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Information Facebook Automation Cloud Computing Covid-19 Holiday Miscellaneous Gadgets Server Managed Service Provider Remote Work Training Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Networking Mobile Device Management Chrome Gmail Budget BYOD Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Avoiding Downtime Marketing How To Office 365 BDR HIPAA WiFi Applications Access Control Conferencing Computing Hacker Information Technology Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Router Bring Your Own Device Big Data Virtual Private Network Health 2FA Help Desk Operating System Computers Retail Risk Management Healthcare Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Physical Security Display Printer Social Windows 11 Paperless Office Infrastructure Monitoring Going Green Excel Customer Service Document Management Cybercrime Remote Workers Telephone iPhone Licensing Virtual Desktop Vulnerabilities Data storage LiFi Entertainment Data Privacy Word Outlook Images 101 Robot Mobility Money Telephone System Multi-Factor Authentication Cost Management Humor Safety Sports IT Management Mouse VPN Employees Meetings Integration Administration User Tip Modem Computer Repair Mobile Security Processor Holidays Data Storage Smart Technology Supply Chain Customer Relationship Management Video Conferencing Settings Wireless Machine Learning Managed Services Provider Printing Professional Services Saving Time Content Filtering Virtual Machines Hacking YouTube Presentation Managed IT Service Maintenance Cryptocurrency Antivirus Downloads Wireless Technology Social Engineering Break Fix Scams IP Address Google Docs Unified Communications Browsers Smartwatch Experience Connectivity IT Running Cable Upload Procurement Remote Computing Azure Hybrid Work Bitcoin Google Wallet Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Recovery CES Tablet IoT Communitications Laptop Trends Supply Chain Management Alert Hard Drives Windows 8 Domains Drones Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Halloween Gamification Flexibility Notifications Staff Value Business Intelligence Refrigeration Legislation Shortcuts Public Speaking Organization Travel Social Networking Google Maps Smart Devices Ransmoware Lithium-ion battery Techology Fileless Malware Digital Security Cameras Entrepreneur Scary Stories Content Remote Working Wearable Technology Memory Vendors Hacks Comparison Google Play Be Proactive Health IT Fun Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Deep Learning Unified Threat Management Directions Videos Wasting Time Threats Undo Network Congestion Specifications Security Cameras Workplace Strategies Education Trend Micro Internet Exlporer Software as a Service Fraud Meta User Error Microchip Username Managing Costs Amazon Mobile Computing Black Friday SSID Search Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Application Best Practice Buisness Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT IBM Legal IT solutions Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Business Growth Websites Mirgation Hypervisor Displays PowerPoint Shopping Cortana Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Alt Codes SharePoint Downtime Management PCI DSS Chatbots Navigation Competition Writing Distributed Denial of Service Workplace Hosted Solution Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Typing Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Google Drive User Superfish Bookmark Knowledge Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data 5G Error History Business Communications

Blog Archive