Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

“Find” the Secrets Behind the Ctrl +F and Ctrl + G Keyboard Shortcuts

“Find” the Secrets Behind the Ctrl +F and Ctrl + G Keyboard Shortcuts

The Ctrl + F keyboard shortcut is incredibly useful, especially when you need to find specific text on a page… but did you know it is capable of so much more than that? Today, we want to go over some specific use cases for this keyboard shortcut and how you can use them in Google Docs and Microsoft Word.

What Does the Basic Keyboard Shortcut Do?

First, you can open the Find window by using the Ctrl + F keyboard shortcut. You’ll see a text field open where you can type in a search query. This will populate results for the chosen word or phrase. You can also jump between instances of the word or phrase by hitting the arrow buttons in the window.

Regardless of whether you prefer Word or Docs, this functionality will be there. The replace feature, though, is a whole other story.

How the Replace Feature Works

The Replace feature in Google Docs is accessed from the Find menu. Use the Ctrl + F shortcut, then click the three-dot menu in the search box.

From here, you’ll see the options in the Find column, but also those for the Replace function. You can replace all instances of a word with anything you wish. You can use a blanket replacement or replace a single instance; it’s up to you. You can also set the function to be case-sensitive or look for special characters, too.

In Microsoft Word, it works a bit differently. Use the Ctrl + G shortcut to open the Replace feature.

Most of these options will look like they do in Google Docs, including the Find and Replace box. Click on More >> to see more checkboxes for specific situations, like capital letters, prefixes, suffixes, whole words, and even white space. It’s obviously a little more dynamic than Google Docs, but that’s hardly a bad thing.

We Have Loads of Tips for You

If you’re looking for more technology tricks, our blog is chock-full of them for technology and business topics. Go ahead and check them out, and come back for even more.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Quick Tips Small Business Passwords Backup Saving Money Cybersecurity Communication Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones Productivity Mobile Devices communications Disaster Recovery Data Recovery Windows Browser Social Media Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Holiday Miscellaneous Gadgets Cloud Computing Information Covid-19 Remote Work Training Server Managed Service Provider Outsourced IT Employee/Employer Relationship Compliance Encryption Spam Office Windows 10 IT Support Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Managed Services Gmail Budget Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi How To BDR HIPAA Computing Hacker Risk Management Virtual Private Network 2FA Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Windows 11 Display Printer Paperless Office Infrastructure Excel Monitoring Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Solutions Cybercrime Physical Security Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Supply Chain Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse iPhone Data Privacy Licensing Entertainment Administration Vulnerabilities Images 101 Multi-Factor Authentication Robot Mobility Telephone System Customer Relationship Management Cost Management Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Employees Integration Username Managing Costs Point of Sale eCommerce 5G Black Friday SSID Small Businesses IP Address Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Displays Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT Outsourcing Google Wallet Proxy Server Reviews Recovery Tactics Development Hotspot Transportation Workplace Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Drones Shopping Nanotechnology Optimization PowerPoint Hiring/Firing Domains Paperless SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Halloween Chatbots Navigation Co-managed IT Refrigeration Management PCI DSS Public Speaking Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Technology Care Business Communications Lithium-ion battery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Entrepreneur Scary Stories Private Cloud Identity Evernote Scams Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Hybrid Work Human Resources Deep Learning Download Net Neutrality Twitter Alerts SQL Server Error History Cables Undo Financial Data Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Google Apps Upload Procurement Remote Computing Azure Cyber security Multi-Factor Security Tech IT Maintenance Mobile Computing Social Network Telework CES Tablet IoT Communitications Search Dark Web Business Intelligence Shortcuts Application Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Ransmoware Managed IT Customer Resource management FinTech IBM Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Vendors Be Proactive Business Growth Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Workforce Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Threats Workplace Strategies Alt Codes Content Remote Working Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Meta Competition Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Amazon Typing Wasting Time Trend Micro Network Congestion Specifications Security Cameras Outsource IT Google Drive User Error Microchip User Internet Exlporer Software as a Service Knowledge Fraud Environment Media

Blog Archive