253.777.0763    Get SUPPORT

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

It's A Plus One Day at Graemouse Technologies!
UTM is a Strong Solution to Ward Off Hackers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Upgrade Apps Cleaning IT Plan Business Computing Amazon Flexibility Recovery Best Practices Microsoft Office Server Bring Your Own Device Human Resources Managed IT The Internet of Things Collaboration Office 365 Avoiding Downtime Paperless Office Safety Data Applications Accountants Small Business IT Services Telephone System Security Network Security Data Storage Private Cloud Marketing Windows 10 Malware Hosted Solutions Wireless Charging Data Breach Tip of the Week Sports Settings Enterprise Content Management Fraud iPhone Cloud Computing Data Protection Authentication Data Backup Gmail Patch Management Encryption Password Advertising Business Mangement MSP Excel Work/Life Balance Managed IT Services Miscellaneous Remote Monitoring Safe Mode Tip of the week Multi-Factor Security Access Control Technology Google Drive Gadgets YouTube Information Cybersecurity OneNote IT Management IT Consultant Operating System Automation Email BDR Bandwidth Workplace Tips Comparison Computers Ransomware Vulnerability Efficiency Update Windows 10s Public Cloud Conferencing Unsupported Software Blockchain Staff Innovation Social Media Business Management Google Saving Money Identity Theft Sync Unified Threat Management Windows Smartphones Network Managed Service Devices Windows 10 Computer Smartphone Legal IT Support Android Physical Security Computer Care Telephone Systems Hardware Budget Thought Leadership Outsourced IT Communication Tools Knowledge Online Voice over Internet Protocol Privacy Cloud Productivity Phishing Humor VoIP Mobile Devices Data Security Save Money Internet of Things Emails Microsoft Law Enforcement CES Backup Artificial Intelligence Passwords Spam Networking Keyboard Communications Business Continuity App Network Congestion Two-factor Authentication Employer-Employee Relationship Solid State Drive Data Management User Error Spam Blocking Charger Router Connectivity Government Word Meetings Redundancy PDF Facebook Managed IT Services Wireless Internet Social Engineering IBM User Tips Wire Website Business Intelligence Mobile Device Management Software Scam Mobile Computing Data Recovery HVAC USB BYOD Telecommuting Business Wi-Fi Internet Money Browser Productivity Millennials Content Management Machine Learning VPN Virtualization Tech Term Alert Cybercrime Windows 7 History Hackers Google Apps Infrastructure Internet exploMicrosoft Virtual Assistant Chrome How To Big Data

Newsletter Sign Up