XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Business Computing Software Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware VoIP Productivity Mobile Office Network Security Gadgets Malware Email Quick Tips Efficiency Network IT Support Innovation IT Services Business Management Business Social Media Business Continuity Smartphones Server Miscellaneous Upgrade Communication User Tips Virtualization Communications Windows Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Users Smartphone Data Recovery Browser Passwords Mobile Device Management Android Holiday Internet of Things Marketing Save Money WiFi Alert Ransomware Tech Term Outsourced IT BDR Vendor Management Artificial Intelligence Cybercrime Mobile Computing Cloud Computing Operating System Remote Monitoring Chrome Router Productivity Windows 10 Avoiding Downtime Computers Automation Bring Your Own Device Cybersecurity Apple BYOD Information Technology Big Data Remote Computing VPN IT Solutions Firewall Managed IT Services Collaboration The Internet of Things Telephone Systems Health Current Events Going Green History Best Practice Spam Application Printer Facebook Phone System Trending Hacking Wireless Technology Social Engineering IT Consultant Employer-Employee Relationship Proactive IT Windows 10 Excel Mobility Budget App IT Support Bandwidth Lithium-ion Battery Mobile Device Money Office Phishing Unified Threat Management Two-factor Authentication Business Intelligence Recovery iPhone Training Mouse Business Managament Content Filtering Private Cloud Networking How To Fax Server Office 365 Applications Maintenance Encryption Windows 8 Information PowerPoint Antivirus Google Drive Data Protection Analytics User Error Blockchain Managed IT Customer Relationship Management Word Hard Drives File Sharing Humor Save Time Outlook Data Security Tutorials Website Virus Redundancy Value Law Enforcement Sports Gmail Access Control Apps Settings Human Resources Analysis Scam Software as a Service Administrator Saving Time Managed Service Network Congestion Hacker Vulnerability Connectivity Downtime Memory Wi-Fi Social Inbound Marketing Conferencing Identity Theft Office Tips Data Management Voice over Internet Protocol Tablet Administration Search Compliance IT Management Twitter Flexibility Social Networking Servers Digital Payment Document Management Entertainment Streaming Media Risk Management Computer Repair Retail Tech Support Machine Learning Public Cloud Skype SaaS Piracy Programming Biometrics Content Management IBM IT service Unsupported Software Infrastructure Leadership Data storage Running Cable Paperless Office Augmented Reality Intranet OneNote Business Technology Computer Accessories Wearable Technology Update Net Neutrality Data Storage eWaste Internet Exlporer Comparison Keyboard Telephony PDF Virtual Assistant Work/Life Balance Data Breach Best Available USB Windows 7 HaaS End of Support Display Robot Google Docs Safety Government Bluetooth Botnet YouTube Meetings Workers People Healthcare Telephone System Samsung Webinar Touchscreen Credit Cards DDoS Help Desk Solid State Drive Online Currency Data loss Black Market Smart Tech Point of Sale Recycling Fraud Video Surveillance Spam Blocking Education Instant Messaging CES IT Plan Wireless Physical Security Statistics Environment Cleaning Password Lifestyle Webcam Insurance nternet Crowdfunding Flash Fiber-Optic Notifications Smart Office Remote Support Electronic Medical Records Cameras Safe Mode Business Owner Licensing Backup and Disaster Recovery Tip of the week Amazon Colocation Storage Windows 10s Laptop Cast WIndows 7 Google Search Telecommuting SharePoint Nanotechnology Remote Worker Law Firm IT Virtual Reality Macro Tools Shadow IT HVAC Security Cameras Charger Company Culture Practices HIPAA Co-managed IT Sync Cables Hybrid Cloud PC Care Search Engine Hiring/Firing Printer Server Shortcut Accountants LinkedIn User Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure 3D Addiction Virtual Private Network Worker Commute Touchpad Scheduling Computer Care Managing Stress Domains ISP Software Tips Remote Work Relocation eBay Wiring Hosted Solution Bloatware Password Manager Legal Enterprise Content Management Employee/Employer Relationship Monitor Hosted Computing Proactive Science Unified Communications Alerts Students Bing Windows 8.1 Update Online Shopping Cache Project Management Audit Staff File Versioning Text Messaging Devices GDPR Netflix Debate Entrepreneur Business Mangement Password Management Smartwatch Data Warehousing Specifications Reputation Gaming Console Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Work Station Shortcuts Root Cause Analysis IoT Supercomputer Hiring/Firing Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Windows Media Player Virtual Desktop Digital Signature NIST Multiple Versions HBO Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand Employee Millennials Customers Line of Business Upgrades Analyitcs Mobile Cortana Uninterrupted Power Supply Electronic Health Records eCommerce Strategy Knowledge Wireless Charging Advertising Wire Microchip FENG Customer Service Multi-Factor Security Cryptocurrency Consultant Restore Data Frequently Asked Questions Distributed Denial of Service Files Content Filter Camera Patch Management IT Security Chromecast Digital Signage Workforce Authentication MSP 360 Print Server Emails Professional Services Google Apps Vendor Screen Mirroring Politics Utility Computing Congratulations Television Printers Transportation How to Troubleshooting Webinar Techology Automobile Public Computer Cryptomining Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Battery Content Two Factor Authentication Emergency Video Games Music Worker Regulation Audiobook Thank You Assessment Scalability Rootkit

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *