shutterstock 9311 TEST SIZE V3 051016


 "Fast Response Times and Resolutions."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery Software communications roundup Business Continuity nonprofit Email bgc Internet User Tips Managed IT Services Alert IT Services Outsourced IT Innovation Smartphones Hardware Tech Term Data Backup Productivity Windows 10 Managed IT Services Browser Server Data Recovery Saving Money Smartphone Computer Ransomware Efficiency Cloud Computing Internet of Things IT Support Cybercrime Android Workplace Tips Small Business IT Support Business Management Communication Network BDR Computers Productivity Office Cybersecurity Windows Miscellaneous Passwords Artificial Intelligence Quick Tips Save Money Applications Social Engineering Managed IT Telephone Systems BYOD Mobile Device Mobility Chrome Recovery Holiday Router Gadgets Windows 10 Mobile Device Management Money Collaboration Vulnerability Health Automation Social Media Firewall Upgrade Law Enforcement Hacking Facebook Wi-Fi Proactive IT Work/Life Balance Phishing Private Cloud Virtualization Office 365 Data Protection Two-factor Authentication Budget Managed Service Provider Flexibility Microsoft Office How To Information Google Drive App Compliance VPN Password Word Bandwidth Office Tips Bring Your Own Device Avoiding Downtime Remote Monitoring Sports Mobile Computing HaaS Save Time Redundancy Settings Scam Voice over Internet Protocol Software as a Service Data Security Value Safety Apps Servers Identity Theft Connectivity Keyboard Encryption Managed Service Information Technology Business Intelligence History Remote Computing Black Market Data Breach Operating System Spam Unsupported Software Computer Care Telephony Human Resources Telephone System Patch Management End of Support Legal Data Storage Website HIPAA OneNote Data storage Risk Management Samsung Infrastructure Paperless Office Charger Wireless Technology IT Management YouTube Automobile Comparison Electronic Medical Records Machine Learning Government PDF IT Plan CES Solid State Drive USB Computing Infrastructure Data Management Update Worker Marketing Employer-Employee Relationship Unified Threat Management Spam Blocking Battery Content Filtering Entertainment Content Management The Internet of Things Credit Cards Hacker WiFi SaaS Access Control Business Owner Hiring/Firing Cleaning Emergency Physical Security Training Workers Blockchain Virtual Assistant Big Data Windows 7 Fraud Google Docs Document Management Microchip Public Cloud File Sharing iPhone Fiber-Optic Two Factor Authentication Google Apps Smart Office Touchpad Vendor Management NarrowBand Shadow IT Books Regulations Amazon Employee IBM Twitter Administrator Instant Messaging Frequently Asked Questions Telecommuting Vendor Assessment Nanotechnology Camera User Error Professional Services Computer Accessories Conferencing eWaste Password Management Wireless Software Tips Search Engine Practices Augmented Reality Downtime Users Skype Cables IT Consultant Staff Regulation Hosted Solution Amazon Web Services Digital Signage Supercomputer Addiction Going Green Reputation Advertising Best Practice Content NIST Hard Drives Search Excel Remote Work Display Television CrashOverride Smart Tech Printers Monitor Colocation Meetings Bluetooth Netflix Criminal Politics Bing Audit Hosted Computing Remote Worker Robot Virtual Reality Start Menu Unified Communications Leadership Password Manager Digital Signature Online Shopping Google Search Transportation Current Events Cache Customers Audiobook Multi-Factor Security Cryptocurrency Relocation How to Tip of the week Security Cameras Public Computer Warranty Data loss HBO Specifications Help Desk Loyalty Computer Fan Inventory Wiring Files Worker Commute Tools Theft Business Mangement HVAC Trending Flash Evernote Net Neutrality Benefits Knowledge Wireless Internet Video Games Rootkit Safe Mode Humor Troubleshooting Windows Server 2008 Botnet Devices Printer Screen Mirroring Scalability Experience Outlook Millennials Shortcuts FENG Gmail Networking Data Warehousing Lifestyle Windows 10s Accountants MSP Chromecast Apple Education Sync Wireless Charging ISP Smart Technology Network Congestion Cortana Wire Laptop Smartwatch Thought Leadership Mouse Internet Exlporer Cast Workforce Social Authentication Techology Mobile Employer Employee Relationship webinar Recycling Enterprise Content Management nonprofits Thank You Congratulations GDPR E-Commerce