Male Rep 2


 "Customer's perception is our reality"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions VoIP Mobile Devices Data Google Microsoft Business bgc Disaster Recovery roundup nonprofit Email Software Alert Innovation Internet Managed IT Services Business Continuity communications Hardware Outsourced IT IT Services Smartphones Tech Term User Tips Data Backup Windows 10 Browser Managed IT Services Ransomware Server Saving Money Computer Android Cloud Computing Data Recovery Efficiency Cybercrime Computers Workplace Tips Business Management Small Business Smartphone Network Internet of Things BDR IT Support Office Save Money Miscellaneous Productivity Productivity Quick Tips Communication Windows IT Support Passwords Mobile Device Management Applications Artificial Intelligence Managed IT Telephone Systems BYOD Money Cybersecurity Social Engineering Recovery Chrome Phishing Social Media Virtualization Gadgets Windows 10 Collaboration Upgrade Law Enforcement Hacking Facebook Vulnerability Firewall Mobility Work/Life Balance Password Microsoft Office Private Cloud Holiday Bring Your Own Device Office 365 Bandwidth Remote Monitoring Two-factor Authentication Data Protection Automation Router Managed Service Provider Office Tips Flexibility Budget Avoiding Downtime Information How To App Compliance VPN Health Wi-Fi Proactive IT Word Remote Computing Data Breach Spam Google Drive Sports Information Technology Mobile Computing HaaS History Scam Black Market Value Operating System Safety Data Security Servers Apps Mobile Device Connectivity Identity Theft Keyboard Business Intelligence Redundancy SaaS Business Owner Hiring/Firing Emergency Cleaning Big Data Government Blockchain Virtual Assistant Training Workers PDF Windows 7 Fraud Solid State Drive Document Management Computing Infrastructure Marketing Unsupported Software Computer Care Patch Management Data Storage Website Legal Telephone System OneNote Save Time HIPAA Infrastructure Paperless Office Risk Management Samsung IT Management Voice over Internet Protocol Charger Wireless Technology Settings Physical Security Software as a Service Automobile YouTube Electronic Medical Records Comparison IT Plan USB Update Data Management CES Worker End of Support Employer-Employee Relationship Data storage Battery Content Filtering Entertainment Encryption Managed Service Unified Threat Management Spam Blocking WiFi Content Management The Internet of Things Credit Cards FENG Hard Drives Gmail Networking Monitor Colocation Outlook Millennials Scalability Experience Access Control Sync Wireless Charging Education Cortana Wire Smart Technology Network Congestion Laptop Robot Data Warehousing Lifestyle Accountants MSP Chromecast Windows 10s Thought Leadership Mouse Help Desk Cast Google Docs Customers Relocation Mobile Techology Recycling Enterprise Content Management Employer Employee Relationship webinar Workforce Authentication Telephony Fiber-Optic Google Apps Smart Office Two Factor Authentication Touchpad Files File Sharing Public Cloud Shadow IT Books Twitter Administrator IBM Human Resources Vendor Management NarrowBand Regulations Amazon Nanotechnology Camera Assessment Humor Professional Services eWaste Password Management Computer Accessories Conferencing Hacker Frequently Asked Questions Telecommuting Instant Messaging Skype Cables Users IT Consultant Software Tips Practices Augmented Reality Hosted Solution Addiction Supercomputer Going Green Apple Best Practice Content Staff Regulation Amazon Web Services Smart Tech Printers Television CrashOverride Microchip Meetings Criminal NIST Bluetooth Netflix Internet Exlporer Excel Remote Work Search Audit Start Menu Unified Communications Virtual Reality Password Manager Machine Learning Leadership Politics Hosted Computing Remote Worker Online Shopping Cache Transportation Current Events iPhone Multi-Factor Security Audiobook Digital Signature Warranty Public Computer Search Engine Data loss Cryptocurrency Tip of the week How to Loyalty Computer Fan Tools Theft Worker Commute Business Mangement HVAC User Error HBO Specifications Inventory Wiring Flash Evernote Wireless Internet Benefits Knowledge Downtime Trending Video Games Wireless Troubleshooting Devices Printer Bing Screen Mirroring Safe Mode Rootkit Reputation Advertising Windows Server 2008 GDPR E-Commerce nonprofits Thank You Congratulations