(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Backup VoIP Mobile Devices Hosted Solutions Innovation Google Email Data Tech Term Outsourced IT Data Recovery IT Support Saving Money Cloud Computing IT Services Internet Microsoft Software Internet of Things BDR Hardware Business Continuity Efficiency Communications Business Smartphones Cybercrime Cybersecurity Communication Small Business Ransomware Artificial Intelligence User Tips Server Disaster Recovery Android Smartphone Windows Avoiding Downtime Save Money How To Managed IT Network Gadgets Computers Alert Browser Managed IT Services Miscellaneous Router Chrome Phishing Social Media BYOD Firewall Law Enforcement Social Engineering Applications Mobile Device Management Two-factor Authentication Business Intelligence Computer Passwords Data Security Data Protection Workplace Tips Windows 10 Mobility Productivity Business Management Vulnerability Money Collaboration Document Management Managed Service Provider Compliance Upgrade Blockchain Private Cloud Word Spam Facebook Remote Monitoring Productivity Connectivity Bandwidth Operating System Flexibility Virtualization Proactive IT Telephone Systems Redundancy IT Support Budget VPN Identity Theft Office 365 Government IT Plan Update Training Workers Google Drive Credit Cards Analysis Unsupported Software Settings Data Storage Quick Tips Servers Data Breach Windows 10 Public Cloud Information Employer-Employee Relationship Content Filtering File Sharing Office Tips Mobile Computing Infrastructure Wi-Fi Mobile Device Data storage Spam Blocking Managed Service Sports App Value Solid State Drive Apps Networking Data loss Holiday Bring Your Own Device CES Virtual Assistant Password Comparison Microsoft Office Hacking OneNote Encryption Business Owner IT Management Unified Threat Management Access Control Windows 7 Big Data Content Management Paperless Office Information Technology Physical Security Smart Tech Work/Life Balance Automation Website Strategy Cryptocurrency Trending Cleaning Netflix Theft Streaming Media Audit User Error Telephony Education Relocation Cast Evernote Authentication Legal Risk Management Colocation Regulations Patch Management Students Downtime Insurance Hiring/Firing Health Frequently Asked Questions Millennials Recycling Wireless Internet Recovery Safe Mode Save Time Lifestyle Computer Care Google Apps Content Filter Computer Fan Skype Current Events HVAC Humor Wireless Charging Nanotechnology MSP Computing Infrastructure Scam Human Resources Healthcare Root Cause Analysis Botnet webinar Fraud Practices HaaS Files Excel Workforce eWaste Wire Knowledge Accountants Apple Software Tips Samsung Storage Reputation FENG Internet Exlporer Start Menu Enterprise Content Management Google Docs Charger Emails Fiber-Optic Remote Worker HIPAA Flash Staff Electronic Health Records Meetings Hybrid Cloud Travel Conferencing Amazon Hosted Computing Entertainment Tip of the week Telecommuting Criminal Augmented Reality Electronic Medical Records Network Congestion Business Technology Hard Drives iPhone Wireless Technology Password Manager USB Customer End of Support Mobile Machine Learning Password Management Data Warehousing Voice over Internet Protocol Cables Safety Devices Wiring Monitor Windows 10s History IBM Digital Signature Marketing Amazon Web Services Hacker Inventory Windows Server 2008 Remote Work The Internet of Things Smart Office PDF Black Market Internet exploMicrosoft Professional Services IT Consultant IoT Data Management HBO Business Mangement Addiction YouTube NIST Multi-Factor Security Unified Communications Thought Leadership Camera Keyboard Sync Supercomputer Office Screen Mirroring Software as a Service Online Shopping Cortana Emergency CrashOverride Advertising Tools Leadership Telephone System Outlook Specifications SaaS Gmail Cache Hosted Solution Customer Service Company Culture Printers Remote Computing Experience Mobile Office Line of Business Computer Accessories Regulation Content Domains Managing Stress Wireless Scalability Music Two Factor Authentication Fun WiFi Vendor Management Best Practice Politics Bluetooth Audiobook Assessment Public Speaking Shadow IT Presentation Wearable Technology Virtual Reality Lithium-ion battery Administration Transportation Books Television Tech Support Automobile 5G Twitter Worker Commute Search Webinar Benefits Worker Proactive Public Computer Loyalty Instant Messaging Troubleshooting Customer Relationship Management IT solutions Competition Video Games Smart Technology Battery Rootkit IP Address Remote Monitoring and Maintenance Employer Employee Relationship Users Techology How to