Female Rep1

 

 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411

Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Microsoft VoIP Google bgc roundup Disaster Recovery nonprofit Software Email Data Alert Managed IT Services Innovation Internet Business Outsourced IT Business Continuity Smartphones communications Windows 10 Hardware IT Services Tech Term Ransomware Saving Money Android Server Managed IT Services Browser Data Backup Cybercrime Computers Small Business Efficiency Internet of Things Cloud Computing IT Support Computer Data Recovery Save Money User Tips Smartphone Business Management Quick Tips Productivity Network Windows BDR Passwords Office Miscellaneous Cybersecurity Mobile Device Management IT Support Applications Communication Artificial Intelligence Managed IT Money Telephone Systems BYOD Social Engineering Recovery Social Media Virtualization Workplace Tips Gadgets Collaboration Hacking Upgrade Law Enforcement Facebook Phishing Firewall Mobility Work/Life Balance Productivity Vulnerability Holiday Microsoft Office Office 365 Private Cloud Bandwidth Remote Monitoring Bring Your Own Device How To Compliance Chrome Router Automation Budget Office Tips Flexibility Managed Service Provider Avoiding Downtime Windows 10 Two-factor Authentication App Health VPN Wi-Fi Data Protection Proactive IT Password Remote Computing Value Google Drive Information Technology Sports Data Security HaaS History Mobile Computing Identity Theft Connectivity Black Market Data Breach Business Intelligence Operating System Mobile Device Apps Safety Word Redundancy Data Storage Website Emergency Electronic Medical Records PDF Big Data Government Infrastructure Paperless Office Computing Infrastructure Solid State Drive Document Management IT Management Worker Marketing Legal Employer-Employee Relationship HIPAA Comparison Unified Threat Management Spam Blocking Save Time Risk Management IT Plan Information Servers Update CES Physical Security Hiring/Firing SaaS Wireless Technology Cleaning Automobile Encryption Managed Service Training Workers YouTube Content Management Credit Cards Data Management End of Support USB Computer Care Data storage Patch Management Keyboard OneNote Entertainment Blockchain Virtual Assistant Battery Content Filtering Windows 7 Spam Samsung Scam Unsupported Software Charger Settings Business Owner The Internet of Things Robot Television CrashOverride Human Resources Telephone System Bluetooth Netflix Education Regulations Amazon Twitter Professional Services Chromecast eWaste Password Management Customers Leadership Frequently Asked Questions Telecommuting Laptop Nanotechnology Camera Audit Transportation Current Events Software Tips Practices Augmented Reality Relocation Techology Skype Cables Addiction Files Public Computer Voice over Internet Protocol Staff Regulation Amazon Web Services Meetings Software as a Service Criminal NIST Shadow IT Books Excel Remote Work Touchpad Smart Tech Loyalty Computer Fan Unified Communications NarrowBand Password Manager Machine Learning Benefits Hacker Knowledge Instant Messaging Hosted Computing Remote Worker Humor Start Menu Cache Multi-Factor Security Digital Signature Rootkit Users Online Shopping Best Practice Content Data loss Cryptocurrency Hosted Solution Tip of the week Apple FENG Tools Theft Business Mangement HVAC Smart Technology Internet Exlporer Network Congestion Search HBO Specifications Going Green Inventory Wiring Windows 10s Wireless Internet Politics Trending Virtual Reality Flash Evernote Audiobook Screen Mirroring WiFi Safe Mode Employer Employee Relationship webinar Windows Server 2008 Devices iPhone Gmail Networking Two Factor Authentication How to Outlook Millennials Access Control Public Cloud Cortana Wire User Error IBM Data Warehousing Lifestyle Accountants MSP Vendor Management Worker Commute Sync Wireless Charging Assessment Video Games Cast Google Docs Computer Accessories Wireless Conferencing Fraud Thought Leadership Downtime Mobile Recycling Enterprise Content Management Reputation Advertising IT Consultant Troubleshooting Workforce Authentication Google Apps Smart Office Monitor Colocation Supercomputer Scalability Experience File Sharing Hard Drives Telephony Fiber-Optic nonprofits Printers GDPR Thank You E-Commerce Congratulations