Infracore LLC Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 17 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Google Network Security Malware Hackers Microsoft Data Software Innovation Internet Business Hardware Tech Term Backup Smartphones Hosted Solutions Windows 10 Browser User Tips Email VoIP Computer Mobile Devices Android Business Continuity Data Backup Communications IT Services Business Management Small Business Managed IT Services Productivity Alert Workplace Tips Office Data Recovery Managed IT Services Computers Ransomware Outsourced IT Disaster Recovery Chrome Miscellaneous Cloud Computing Smartphone Efficiency Network Communication Artificial Intelligence Law Enforcement Cybercrime Money Passwords Telephone Systems Social Media Router Collaboration Cybersecurity Windows 10 How To Password Applications Facebook Virtualization Internet of Things Windows Productivity IT Support Information Health Work/Life Balance Server Social Engineering Gadgets App Office 365 Quick Tips Saving Money Upgrade Apps Data Security Word HaaS Bring Your Own Device Save Money Office Tips Data Protection Private Cloud Holiday IT Support Vulnerability Two-factor Authentication Keyboard Spam Microsoft Office Hacking Google Drive Connectivity Automation Wi-Fi Mobile Device Management Scam Data Breach Phishing BDR Mobile Device Electronic Medical Records Servers Operating System Comparison Samsung Paperless Office Bandwidth Marketing PDF Website CES Training Unsupported Software Entertainment Remote Monitoring Battery USB Value Firewall Networking Managed Service Provider Voice over Internet Protocol Content Management Managed Service Managed IT Government Virtual Assistant Remote Computing Employer-Employee Relationship Windows 7 Business Intelligence Settings Blockchain Charger BYOD Public Cloud Update Telephone System Flexibility Identity Theft Patch Management Sports Data Storage Infrastructure Encryption Cleaning Legal Worker OneNote Mobility Automobile IT Management End of Support Redundancy VPN Big Data History Avoiding Downtime Spam Blocking Computer Care Data Management Fraud IT Plan Data loss Content Cortana Thought Leadership IT Consultant Tip of the week Staff Wearable Technology Remote Worker Benefits Search Engine iPhone Search Downtime Amazon Authentication webinar Advertising Instant Messaging Gmail Computer Accessories Safe Mode The Internet of Things Virtual Reality Telecommuting Wireless Internet Television Warranty Relocation Screen Mirroring User Error Video Games Audiobook Google Apps HVAC Leadership Windows 10s Windows Server 2008 Specifications Wiring Nanotechnology Machine Learning Bing HBO How to Vendor Management Root Cause Analysis Amazon Web Services Conferencing Software Tips Recovery Recycling Bluetooth FENG Monitor Telephony Worker Commute Remote Work Practices Emergency Wire Public Computer Printer Cast Workers Addiction Save Time Enterprise Content Management Education Digital Signature Troubleshooting Loyalty Unified Threat Management Online Shopping Smart Tech Smart Technology YouTube Current Events Help Desk Outlook Black Market MSP Botnet Emails eWaste Skype Hosted Computing Mouse Humor Internet Exlporer Scalability Cache Password Management Solid State Drive Flash Computing Infrastructure Millennials SaaS Mobile Computing Evernote Two Factor Authentication Knowledge Frequently Asked Questions Multi-Factor Security HIPAA Experience File Sharing Meetings Files Travel Wireless Hybrid Cloud WiFi Criminal Risk Management Data storage Start Menu Credit Cards Inventory Smart Office Administrator Password Manager Hiring/Firing NIST Audit Workforce Camera Best Practice Wireless Charging Devices Network Congestion Excel Trending Human Resources Music Augmented Reality Microchip IT solutions Apple Physical Security Google Docs Politics Rootkit Tools Access Control Transportation Document Management Safety Information Technology Internet exploMicrosoft Business Mangement Employer Employee Relationship Cryptocurrency Computer Fan Techology Sync Users Accountants Books Assessment Thank You Twitter Congratulations Company Culture Software as a Service Webinar Compliance Managing Stress Regulation CrashOverride Printers

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

BessieLHuerta 8 Data Backup Terms You Should Know
15 November 2018
I can understand the importance of this content about the data backup and I think it will attract ma...
Constance Rowe Are You Intrigued By the Tech of CES 2018?
15 November 2018
An internal blog is intriguing for the storing of the information. The visitors of the https://www.b...
Leo Reid A Few Security Lessons Your Business Can Learn From Game of Thrones
07 November 2018
Few lessons of the learning have been consumed for the better range of the people. The sort of the i...
Risa Franklin Is a Data Backup Really That Necessary? In a Word: Yes
01 November 2018
Data protection is very important for us with we can get rid from various kinds of problems while ru...
Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...