Contact us today!
845-876-6561

Professional Computer Associates Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Malware Backup Hosted Solutions Managed IT Services Google VoIP Email Disaster Recovery Innovation Mobile Devices Microsoft Software Internet Data Productivity Data Backup Business Continuity Outsourced IT Business communications Efficiency Cybercrime Smartphones Hardware IT Services Ransomware Computer Data Recovery IT Support Windows 10 Internet of Things Android Tech Term Browser Cloud Computing BDR Office Saving Money Computers Server Business Management Workplace Tips User Tips Network Windows Alert Telephone Systems Save Money Artificial Intelligence Virtualization Smartphone Miscellaneous Mobile Device Management Upgrade Applications Small Business Cybersecurity Social Media Facebook Chrome Social Engineering Passwords Microsoft Office Quick Tips Communication Firewall Managed IT Collaboration Law Enforcement BYOD Automation Bandwidth Gadgets Avoiding Downtime Work/Life Balance Password Office Tips App Recovery Managed Service Provider Money Productivity Holiday Hacking Mobility Private Cloud Office 365 Router How To Remote Monitoring Wi-Fi Data Security Data Protection Bring Your Own Device Data Management HaaS Windows 10 Health Two-factor Authentication Redundancy Budget Training Operating System Information Technology Managed IT Services Gmail Flexibility VPN Phishing Proactive IT Business Intelligence Marketing User Error Spam Employer-Employee Relationship Safety Google Drive Mobile Device Apps Entertainment Analysis Blockchain Encryption Mobile Computing IT Management Identity Theft Compliance IT Support Word Connectivity Vulnerability Value Sports Cleaning Document Management Data Breach Settings Risk Management SaaS Big Data Black Market Smart Tech Paperless Office Unified Threat Management Infrastructure Physical Security Legal Shadow IT Automobile Worker Streaming Media Hiring/Firing DDoS Spam Blocking USB Website Content Management Windows 7 HIPAA Computer Care Internet Exlporer Data loss YouTube Comparison Downtime Meetings Public Cloud Wearable Technology Samsung Wireless Information Battery History The Internet of Things Apple OneNote File Sharing Patch Management Business Owner IT Plan Credit Cards Keyboard Managed Service Education eWaste Scam Unsupported Software Data storage Solid State Drive Content Filtering PDF Servers Machine Learning Update Government Remote Computing Data Storage End of Support Workers Wireless Technology Charger Virtual Assistant Save Time Networking Computing Infrastructure Electronic Medical Records Access Control Best Practice CES Instant Messaging Telecommuting Internet exploMicrosoft Chromecast Windows Server 2008 Telephone System Benefits IaaS webinar GDPR Cables Content Filter Humor FENG Professional Services Cryptocurrency Books IBM Strategy hacker Line of Business Virtual Reality Amazon Web Services Authentication Sync Assessment iPhone Search Network Congestion Data Warehousing SharePoint Remote Work Insurance Advertising Emails Students Password Manager WiFi Smart Technology Conferencing HBO Cache E-Commerce Rootkit Unified Communications Storage Monitor Uninterrupted Power Supply Tools Safe Mode Emergency MSP Worker Commute Employer Employee Relationship Online Shopping Nanotechnology Distributed Denial of Service Windows 10s Telephony HVAC Troubleshooting Television Voice over Internet Protocol How to Practices Regulations People Healthcare Business Mangement Screen Mirroring Going Green Frequently Asked Questions Wireless Internet Content Theft Reputation Techology Fax Server Specifications Accountants Augmented Reality Computer Accessories Evernote Robot Hard Drives Skype Enterprise Content Management Hosted Solution Public Computer Multi-Factor Security Human Resources Files Notifications IT Consultant Two Factor Authentication Hosted Computing Hybrid Cloud Mobile Office Electronic Health Records Software as a Service Recycling Relocation Video Games Supercomputer Cast Laptop NarrowBand Excel Wire Audiobook Vendor Management Cortana Addiction Customer Botnet IT solutions Business Technology Millennials Remote Worker Bluetooth Wireless Charging Devices Mouse Audit Start Menu Password Management Trending Staff Colocation Leadership Fraud Inventory Netflix Experience Loyalty Criminal Scalability Current Events Proactive Workforce IoT Touchpad Tip of the week Environment Smart Office Politics Google Apps Tech Support Root Cause Analysis Travel Transportation Software Tips Wiring Fiber-Optic Thought Leadership Outlook Computer Fan Mobile Running Cable NIST Lifestyle Digital Signature Users Amazon Flash Antivirus Music Google Docs Lithium-ion battery Knowledge Remote Monitoring and Maintenance Managing Stress Regulation Administration Webinar Thank You Printers Twitter IT solutions Congratulations CrashOverride Company Culture

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!