(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Hosted Solutions Backup VoIP Mobile Devices Email Google Outsourced IT Data Recovery IT Support Tech Term Data Saving Money Internet of Things Microsoft Cloud Computing Software Communications Hardware Internet BDR IT Services Business Continuity Efficiency Cybersecurity Ransomware Business Small Business Cybercrime Disaster Recovery User Tips Smartphones Android Artificial Intelligence Communication How To Gadgets Managed IT Network Browser Server Computers Alert Managed IT Services Smartphone Windows Avoiding Downtime Save Money Productivity Mobility Business Intelligence Money Miscellaneous Data Security Data Protection Windows 10 Business Management Collaboration Social Media Mobile Device Management Vulnerability Router Social Engineering Two-factor Authentication Chrome Law Enforcement BYOD Phishing Firewall Passwords Applications Operating System Productivity Virtualization Budget Bandwidth Flexibility Workplace Tips Telephone Systems Office 365 Proactive IT Connectivity IT Support VPN Upgrade Redundancy Spam Managed Service Provider Document Management Private Cloud Compliance Computer Identity Theft Facebook Blockchain Remote Monitoring Word Unsupported Software Mobile Device Analysis Servers Data Storage Microsoft Office App Mobile Computing Big Data Value Solid State Drive Infrastructure Holiday Hacking Spam Blocking Networking Website Sports Bring Your Own Device Information Password File Sharing Business Owner Unified Threat Management Physical Security Information Technology Automation CES Government Managed Service Data loss Work/Life Balance Comparison Windows 10 OneNote IT Management Encryption Google Drive Content Management Paperless Office Training Workers Windows 7 Access Control Wi-Fi Quick Tips Smart Tech Virtual Assistant IT Plan Settings Public Cloud Employer-Employee Relationship Data Breach Update Data storage Credit Cards Content Filtering Apps Office Tips Lifestyle The Internet of Things HIPAA Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Marketing Hacker Google Apps Content Filter Knowledge Entertainment Human Resources Healthcare Charger Emails Customer End of Support Wireless Charging Nanotechnology Hard Drives iPhone Wire Conferencing Monitor History Excel Workforce USB Fraud Practices Root Cause Analysis Botnet eWaste Software Tips Accountants Safe Mode FENG Start Menu Storage Electronic Medical Records Network Congestion Staff Electronic Health Records Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic MSP Google Docs Criminal Tip of the week Telecommuting Amazon Hosted Computing Meetings Travel Data Management Keyboard Office Mobile Password Manager IT Consultant Cortana Voice over Internet Protocol Digital Signature Machine Learning Advertising Enterprise Content Management Windows 10s Cables Devices Supercomputer Remote Worker Data Warehousing Smart Office User Error Windows Server 2008 Remote Work Hosted Solution Amazon Web Services Inventory Emergency Colocation HBO IoT SaaS Relocation Business Technology Professional Services Business Mangement Addiction Leadership Multi-Factor Security Legal Risk Management YouTube Cleaning Netflix Password Management Sync Education Unified Communications Thought Leadership Hiring/Firing Health Wiring Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Computing Infrastructure Outlook Specifications Humor CrashOverride Tools Save Time Gmail Cache Trending Augmented Reality Strategy Computer Care NIST Audit Telephony Theft Streaming Media Current Events Files Students Reputation Internet Exlporer Regulations Evernote Authentication Scam Apple Cast Wireless Technology HaaS webinar Frequently Asked Questions Millennials IBM Insurance Telephone System Downtime Safety Recycling Wireless Internet Printers Managing Stress Virtual Reality Transportation Line of Business WiFi Customer Relationship Management Books Television Search Regulation Competition Automobile IP Address Worker Commute Webinar Users Benefits Worker Customer Service Instant Messaging Troubleshooting Public Computer Video Games Loyalty Mobile Office Twitter Domains IT solutions Battery Smart Technology Rootkit How to Wireless Techology Remote Computing Experience Employer Employee Relationship Public Speaking Proactive Presentation Content Scalability Music Fun Lithium-ion battery Computer Accessories Best Practice Politics Company Culture Two Factor Authentication Camera Vendor Management Tech Support Shadow IT Remote Monitoring and Maintenance 5G Audiobook Bluetooth Administration Wearable Technology Assessment