094 90 48200     Get SUPPORT

Aniar IT Services Blog

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

Attempts to Make Smart Cities Hit a Snag
UTM is a Strong Solution to Ward Off Hackers


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, April 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy User Tips Business Computing Google Cloud Tech Term Productivity Internet Email Network Security Microsoft Data Data Backup Workplace Tips Hosted Solutions Hardware Mobile Devices Data Recovery Innovation VoIP Communications Communication Hackers Cloud Computing Malware Smartphone Efficiency Android IT Services Windows 10 Smartphones Network Business Management IT Support Small Business Software Managed IT Services Browser Internet of Things Backup Artificial Intelligence Business Cybersecurity Windows Collaboration Gadgets Mobile Device Router Chrome How To Server Spam Outsourced IT Business Continuity Computer Information Word Cybercrime Office 365 Computers Applications Saving Money BDR Mobile Device Management Two-factor Authentication Vulnerability Operating System Passwords Data Protection Managed Service Paperless Office Holiday Phishing Facebook Ransomware Settings Connectivity Miscellaneous Data Security Money Encryption Social Media Human Resources Business Intelligence Software as a Service Infrastructure Update Training Content Management Keyboard Spam Blocking VPN Botnet Wi-Fi Staff Disaster Recovery Password Windows 7 Blockchain Managed IT services Bring Your Own Device Voice over Internet Protocol IT Management Augmented Reality Virtual Assistant Automation Redundancy App Telephone Systems Apps Social Engineering BYOD Meetings Google Drive Avoiding Downtime Save Money Microsoft Office Identity Theft Comparison Private Cloud IT Plan Telephone System Remote Monitoring Website OneNote Google Docs Virtualization Sports Law Enforcement Access Control CES Telephony Machine Learning Unsupported Software Upgrade Data Storage Fraud Managed IT Cryptocurrency Display Scam Cryptomining Data loss Wireless Computer Fan Education Authentication Windows Server 2008 Cache YouTube Mouse Software Tips Practices HBO Google Search Smart Office Quick Tips Amazon Telecommuting Safe Mode Security Cameras eWaste Thought Leadership Remote Worker Database Cortana Alert Networking Shortcuts FENG OLED Bandwidth Computer Care Wireless Internet Skype Microchip Charger Hosted Computing Outlook Government Save Time Document Management Camera Amazon Web Services Accountants Travel Remote Work Smartwatch Legal Wiring Business Technology 5G Tools Work/Life Balance Enterprise Content Management Mobility Biometric Security Password Manager Nanotechnology Patch Management HIPAA USB Start Menu Search Engine Solid State Drive Wireless Charging Inventory Frequently Asked Questions Recovery Proactive IT Sync Multi-Factor Security Windows 10s The Internet of Things Health Downtime Hacker Criminal Firewall Screen Mirroring Digital Signature Millennials Password Management Social Business Mangement Smart Tech WiFi Employer-Employee Relationship Electronic Medical Records Wire Servers Bing Audit Physical Security Google Apps Excel MSP Net Neutrality Addiction Entertainment Warranty Big Data Online Shopping Employee Root Cause Analysis Unified Threat Management Cast Credit Cards PDF Value Workforce NIST Vendor Users Gmail Flash Data Management Specifications HVAC Help Desk Workers Tip of the week File Sharing ISP Trending Printer Public Cloud Evernote Cleaning Digital Signage Mobile Computing Recycling Devices HaaS Windows 10 Regulation Public Speaking CrashOverride Presentation Emergency Lithium-ion battery Company Culture Managed Service Provider Wireless Technology Tech Support Safety Managing Stress IBM Hiring/Firing Twitter Printers Productivity Marketing Fun Manufacturing Budget Competition Customer Relationship Management IP Address Customer Service Compliance Hard Drives Mobile Office Domains Search