Browse Definitions :
Definition

Find and replace (FnR) wildcards for Microsoft Word

?= Any 1 character

 *=Any string of characters


@ any number of repeats of the previous character


<=the beginning of a word

 >=the end of a word

{n}=n repeats of the previous char

{n,}=at least n repeats

 {n-m}= between n and m repeats

[ ] marks a set of characters

 A - used inside this means an ascending range between the two hyphenated characters

 A !, only valid at the set’s start, means ‘any character except’.

() groups the expressions and indicates the order of evaluation. It is used with the n wildcard to rearrange expressions. The result of the 1st () pair is represented by 1, the next pair 2 and so on.

The easiest way to use a special character as a literal, eg to find a {, use the ASCII code instead. ASCII codes are specified in ANY sort of search with the ^.

= ^92                   {=^123                   }=^125                   ?=^63
*=^42                   [=^91                    ]=^93                    ^=^94
@=^64                   <=^60                   >=^62

To find some relevant information in Word’s help file, go to Contents > Editing and Sorting text > Finding and Replacing Text.

This was last updated in May 2008
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close