XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Small Business Hackers Hosted Solutions Data Productivity Google Hardware Mobile Devices Mobile Office VoIP Email Gadgets Quick Tips Malware Efficiency Network Security IT Support Network Innovation Social Media Business Management IT Services Smartphones Server Miscellaneous Business Continuity Business Virtualization Upgrade Windows Disaster Recovery Communication Microsoft Office Managed IT Services Users Computer Communications User Tips Mobile Device Management Data Backup Passwords Android Browser Marketing Save Money Smartphone Alert WiFi Holiday Tech Term Vendor Management Mobile Computing Data Recovery Ransomware Cybercrime Internet of Things Windows 10 Operating System Outsourced IT Remote Monitoring Bring Your Own Device Apple BYOD Information Technology Avoiding Downtime Cloud Computing BDR Computers Best Practice History Automation Router Big Data Going Green Remote Computing IT Solutions The Internet of Things Firewall Artificial Intelligence VPN Telephone Systems Chrome Current Events Spam Social Engineering IT Consultant Employer-Employee Relationship Trending Cybersecurity Facebook Application Phone System Health Collaboration Hacking Wireless Technology Bandwidth Proactive IT Excel App Managed IT Services Office Printer Budget Money Lithium-ion Battery Content Filtering Maintenance Applications Windows 8 Business Intelligence Networking Unified Threat Management Two-factor Authentication Mobility How To Business Managament Recovery iPhone Fax Server Office 365 Website Antivirus Data Protection Apps Gmail Analytics User Error PowerPoint Data Security Managed IT Humor Outlook Tutorials Sports Customer Relationship Management Virus Value Hard Drives Training Private Cloud Redundancy Mouse Windows 10 Law Enforcement Phishing Office Tips Encryption Administration IT Support Tech Support Compliance Analysis Vulnerability Blockchain Saving Time Mobile Device Social Networking Word Flexibility Digital Payment Entertainment Computer Repair Downtime Google Drive File Sharing Memory Settings Connectivity Identity Theft Retail Conferencing IT Management Network Congestion Productivity Search Tablet Twitter Document Management Inbound Marketing Data Management Save Time Streaming Media Risk Management Statistics Content Management Solid State Drive Infrastructure Black Market Touchscreen Unsupported Software Machine Learning Information Programming OneNote Skype Cleaning Password Update Wireless Physical Security Running Cable Augmented Reality Intranet Data Storage Scam Public Cloud Wearable Technology Managed Service Video Surveillance Comparison SaaS Paperless Office Instant Messaging Work/Life Balance Data Breach Windows 7 Environment Data storage Piracy Human Resources IBM Best Available Workers Internet Exlporer Biometrics Bluetooth Virtual Assistant Administrator eWaste Leadership People IT service Credit Cards PDF Safety Wi-Fi Data loss Computer Accessories HaaS End of Support Hacker Samsung YouTube Government Servers Spam Blocking CES Meetings Online Currency Webinar Recycling Access Control IT Plan Point of Sale Social Robot Smart Tech Education DDoS USB Entrepreneur Print Server Cryptocurrency Gaming Console Windows 10s Software as a Service Customers Content Filter Business Owner Work Station Tip of the week Amazon Uninterrupted Power Supply Tools Remote Support Authentication MSP Charger Cast Telecommuting Advertising Tablets nternet Crowdfunding Sync Cables Chromecast Windows Media Player Virtual Desktop Insurance Hiring/Firing Distributed Denial of Service Files Hiring/Firing Smart Office HIPAA Cost Management Law Firm IT Safe Mode Storage Company Culture Windows Server 2008 Amazon Web Services Password Manager Nanotechnology Remote Worker Computer Care Software Tips Remote Work Notifications Upgrades Analyitcs HVAC Hosted Solution Telephony Unified Communications Laptop Customer Service Practices Colocation Keyboard LinkedIn Macro Shadow IT Accountants Business Technology Audit Google Docs Staff SharePoint Consultant Addiction Net Neutrality Co-managed IT Online Shopping Enterprise Content Management Webcam Netflix Botnet Business Mangement Windows 8.1 Update Wiring Hybrid Cloud Start Menu Theft Touchpad Cameras Hosted Computing Display Proactive Root Cause Analysis Data Warehousing Specifications IaaS Computing Infrastructure Students Legal Debate Computer Fan Voice over Internet Protocol Digital Signature Relocation Licensing Cache Supercomputer Regulations Evernote Virtual Reality Password Management Travel Criminal Monitor WIndows 7 Devices GDPR PC Care HBO Mobile Cortana Printer Server Shortcut Inventory Remote Monitoring and Maintenance 3D Millennials Healthcare Scheduling Worker Commute IoT Telephone System FENG eBay Multi-Factor Security Strategy User Wireless Internet Knowledge Wireless Charging Bloatware NIST Patch Management Reputation Managing Stress Domains Thought Leadership E-Commerce Alerts Frequently Asked Questions Fraud Professional Services Google Apps Line of Business Screen Mirroring Workforce Internet exploMicrosoft Science Electronic Health Records 360 Emails Fiber-Optic NarrowBand IT Security Electronic Medical Records Help Desk Text Messaging Lifestyle Wire Flash Transportation Thank You Camera Television Troubleshooting Webinar Scalability Benefits Congratulations Automobile Printers Public Computer IT solutions How to Employer Employee Relationship CrashOverride Techology Smart Technology Books Loyalty Experience Two Factor Authentication Content Emergency Worker Music Audiobook Assessment Battery Rootkit Video Games Regulation Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *