XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, December 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hosted Solutions Data Hackers Small Business Hardware Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Efficiency Network Security Network IT Support Innovation Business Social Media Business Management IT Services Business Continuity Smartphones Server Miscellaneous Upgrade Virtualization Communication Windows User Tips Disaster Recovery Data Backup Communications Computer Managed IT Services Microsoft Office Users Mobile Device Management Passwords Data Recovery Browser Android Smartphone Marketing Holiday Save Money WiFi Alert Ransomware Outsourced IT Vendor Management BDR Tech Term Cybercrime Mobile Computing Internet of Things Operating System Chrome Remote Monitoring Cloud Computing Windows 10 Information Technology Computers Avoiding Downtime Bring Your Own Device Apple BYOD Going Green Spam Firewall Big Data VPN Managed IT Services Remote Computing Telephone Systems IT Solutions Automation Cybersecurity The Internet of Things Current Events Artificial Intelligence Best Practice History Router Printer Application Facebook Collaboration Hacking Trending Phone System Social Engineering Health Wireless Technology Employer-Employee Relationship IT Consultant Money App Budget Proactive IT Bandwidth Lithium-ion Battery Office Excel Windows 10 Two-factor Authentication Mobility IT Support Unified Threat Management Business Intelligence Recovery Business Managament iPhone Mouse Fax Server Networking How To Office 365 Content Filtering Maintenance Applications Windows 8 Productivity Information Phishing Apps Google Drive Data Protection User Error PowerPoint Antivirus Managed IT Blockchain Humor Word Outlook Analytics Tutorials Virus Data Security Customer Relationship Management Website Training Hard Drives Private Cloud Redundancy Law Enforcement Gmail Encryption Value Sports Mobile Device Document Management Human Resources Social Networking Scam Digital Payment Analysis Computer Repair Streaming Media Risk Management Software as a Service Managed Service Network Congestion Vulnerability Saving Time Connectivity Administrator Save Time Identity Theft Downtime Office Tips File Sharing Memory Voice over Internet Protocol Data Management Inbound Marketing Conferencing Compliance Flexibility IT Management Servers Entertainment Tablet Administration Tech Support Search Settings Twitter Retail Recycling Point of Sale Public Cloud Education SaaS Biometrics Video Surveillance Content Management IT service Unsupported Software Infrastructure Statistics Data storage Hacker Paperless Office OneNote Programming IBM Skype Piracy Update Data Storage Leadership eWaste Internet Exlporer Comparison Augmented Reality Intranet Keyboard Telephony Running Cable PDF Wearable Technology Safety Wi-Fi Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support Robot Computer Accessories Google Docs Government YouTube Meetings Workers Webinar Telephone System Social Best Available Help Desk Credit Cards DDoS Bluetooth Data loss Access Control People Solid State Drive Black Market Smart Tech Samsung Touchscreen Fraud Spam Blocking Instant Messaging CES IT Plan Wireless Online Currency Physical Security Environment Cleaning Password Machine Learning Lifestyle Insurance Flash Fiber-Optic Notifications Smart Office Electronic Medical Records Cameras Safe Mode Business Owner Licensing Tip of the week Amazon Colocation Storage Windows 10s Macro IT Security Laptop Charger Cast WIndows 7 Telecommuting SharePoint Nanotechnology Remote Worker Virtual Reality Co-managed IT Tools Print Server Shadow IT HVAC Remote Support Practices HIPAA Webcam Sync Cables nternet Crowdfunding Hybrid Cloud Search Engine Hiring/Firing Printer Server Shortcut Touchpad Accountants Business Technology User Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Virtual Private Network Worker Commute Enterprise Content Management Computer Care Managing Stress Domains Software Tips Remote Work Company Culture Relocation Wiring Hosted Solution Bloatware Password Manager Law Firm IT Legal Monitor Hosted Computing Proactive Science Unified Communications Students Bing PC Care Staff Scheduling Online Shopping LinkedIn Cache Project Management Audit 3D Password Management Net Neutrality Devices GDPR Netflix Entrepreneur eBay Botnet Business Mangement Alerts Data Warehousing Specifications Windows 8.1 Update Reputation Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Healthcare Shortcuts Root Cause Analysis Digital Signature Display IoT Supercomputer Hiring/Firing Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Windows Media Player Virtual Desktop NIST HBO Thought Leadership E-Commerce Cost Management Text Messaging Travel Criminal NarrowBand Debate Work Station Millennials Customers Line of Business Upgrades Gaming Console Analyitcs Mobile Cortana Uninterrupted Power Supply Electronic Health Records Multi-Factor Security Strategy Knowledge Wireless Charging Advertising Wire Microchip FENG Customer Service Cryptocurrency Consultant Frequently Asked Questions Distributed Denial of Service Files Content Filter Camera Patch Management Chromecast Screen Mirroring Workforce Authentication MSP 360 Emails Professional Services Google Apps Politics Utility Computing How to Television Printers Transportation Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Battery Content Two Factor Authentication Emergency Video Games Thank You Music eCommerce Worker Regulation Audiobook Assessment Scalability Rootkit Congratulations

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *