(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Mobile Devices Hosted Solutions Google Email Outsourced IT Tech Term Data Recovery Data IT Support Internet of Things IT Services Cloud Computing Saving Money Internet Microsoft Software BDR Business Continuity Efficiency Hardware Communications Cybercrime Business Smartphones Cybersecurity Ransomware Communication Small Business User Tips Android Server Artificial Intelligence Disaster Recovery Smartphone Managed IT Services Gadgets Avoiding Downtime Browser Windows Save Money Managed IT How To Alert Network Computers Applications Social Engineering Law Enforcement Chrome Firewall Miscellaneous Phishing Workplace Tips Social Media Mobility Business Intelligence Mobile Device Management Windows 10 Data Security Data Protection Two-factor Authentication Collaboration Computer Passwords Money Vulnerability Router BYOD Business Management Productivity Budget Managed Service Provider Blockchain Private Cloud Word Compliance Office 365 Flexibility Upgrade Connectivity Telephone Systems Remote Monitoring Spam Operating System Virtualization Productivity Bandwidth Redundancy Proactive IT Document Management IT Support VPN Identity Theft Facebook Government IT Plan Microsoft Office Update Credit Cards Big Data Office Tips Google Drive Analysis Training Workers Mobile Device Unsupported Software Website Servers Data Storage Quick Tips App Public Cloud Settings Infrastructure Employer-Employee Relationship Data Breach Mobile Computing Information Solid State Drive Spam Blocking Holiday Content Filtering Sports File Sharing Data storage Windows 10 Password Managed Service Business Owner CES Information Technology Wi-Fi Work/Life Balance Value Data loss Hacking OneNote Networking Encryption Comparison Access Control Bring Your Own Device Content Management IT Management Paperless Office Virtual Assistant Apps Smart Tech Windows 7 Physical Security Unified Threat Management Automation User Error Evernote Audit Authentication Telephony Emergency Students Trending Telephone System HaaS Relocation SaaS Recycling Cast Wireless Internet Cryptocurrency Colocation Leadership Insurance Regulations Cleaning Netflix Google Apps Downtime Content Filter Hiring/Firing Health Frequently Asked Questions Millennials Wireless Charging Computer Fan Nanotechnology Skype HIPAA Patch Management Human Resources Healthcare Lifestyle Practices Entertainment Humor eWaste Wire Safe Mode Computing Infrastructure Fraud Computer Care Root Cause Analysis Storage Botnet HVAC USB Files Current Events Accountants Excel Workforce MSP Reputation Internet Exlporer Fiber-Optic FENG Start Menu Scam Apple Staff Software Tips Electronic Health Records webinar Amazon Hosted Computing Flash Criminal Google Docs PDF Black Market Data Management Samsung Hybrid Cloud Password Manager Meetings Travel Enterprise Content Management Knowledge Tip of the week Telecommuting Remote Worker Customer Charger End of Support Emails Cables Devices Mobile Keyboard Hard Drives iPhone Digital Signature Machine Learning Monitor History Conferencing Amazon Web Services Windows 10s Inventory Data Warehousing Smart Office Voice over Internet Protocol Business Technology Wiring Business Mangement Addiction Password Management Hosted Solution Electronic Medical Records Network Congestion IoT Windows Server 2008 Remote Work Internet exploMicrosoft Unified Communications Thought Leadership Professional Services HBO YouTube Augmented Reality Online Shopping Sync Legal Risk Management Multi-Factor Security Wireless Technology Education Camera IBM Office Gmail Screen Mirroring Cache Software as a Service NIST Safety Recovery Cortana IT Consultant Advertising Theft CrashOverride Streaming Media Tools Marketing Hacker Supercomputer Strategy Outlook Specifications The Internet of Things Save Time Rootkit Best Practice Politics Printers Customer Relationship Management Audiobook Competition Shadow IT Employer Employee Relationship IP Address Wearable Technology Managing Stress Line of Business Users Regulation Virtual Reality Customer Service Fun WiFi Computer Accessories Automobile Mobile Office Two Factor Authentication Vendor Management Domains Worker Commute Administration Assessment Wireless Bluetooth Twitter Instant Messaging Troubleshooting Video Games Transportation Public Speaking Search Books Television Presentation Battery Techology Lithium-ion battery How to Webinar Remote Computing Experience Benefits Proactive Worker Tech Support Public Computer 5G Content Loyalty IT solutions Scalability Music Smart Technology Company Culture Remote Monitoring and Maintenance