Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Set Your System up with the Apps You like to Use

Tip of the Week: Set Your System up with the Apps You like to Use

Sometimes you’ll open up a document and it will open up in a default program on your computer that you never use, or one that you might not even know you have. This can happen with common types of file formats, like PDFs or MP3s, that could be opened by more than one program on your computer. Windows 10 makes it easy to customize your user experience through changing up the default applications for specific file types. We’ll show you how it’s done.

To change your default applications for Windows 10, just follow these steps:

  • Click on the Start menu in the bottom-left corner of the screen.
  • Click on Settings. It’s the option with a gear-like icon next to it.
  • Select the System option.
  • Click on Default apps next.

You’ll see your options for selecting an app in the form of categories. These categories are Email, Maps, Music Player, Video Player, Photo Viewer, and Web Browser. Once you’ve selected a category, you can choose a default app that will open anything related to that category.

An easier way to do this is by right-clicking the file you want to open. You then need to select Open with. Choose the app that you’d like to use to open the file, or you can select Choose another app if you don’t see the one you want. You can either select it for this one instance or you can have Windows remember your choice for the future.

If you need to reset your default apps, it’s as easy as can be. Just follow the steps below… just in case you set a default app you don’t like.

  • Click on the Start menu.
  • Select Settings.
  • Navigate to System.
  • Click Default apps.
  • Click the Reset button at the bottom.

Once you’ve finished, your Windows 10 device will reset to its default applications. It’s really that easy.

Don’t fall behind the times with your tech knowledge. To keep learning more about your favorite business solutions, subscribe to our blog.

 

Comments 1

Ulla Clements on Saturday, 21 September 2019 05:48

Total tech care is best forum to get the information about news and current event happening in the world as well as also get information about https://topaustralianwriters.com/australian-essay-review/ the information technology innovation which is updated day by day and create the new thing every day.

Total tech care is best forum to get the information about news and current event happening in the world as well as also get information about https://topaustralianwriters.com/australian-essay-review/ the information technology innovation which is updated day by day and create the new thing every day.
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Tech Term Chrome Virtualization Social Media Managed IT Services Managed Service Microsoft Office Automation Cybercrime Artificial Intelligence Operating System Facebook Computers BYOD Health Internet of Things Mobile Device Management Networking IT Support Wi-Fi Hacking Covid-19 Alert Information Spam Managed Service Provider Office 365 Telephone Systems Remote Information Technology Recovery Employer-Employee Relationship BDR Bandwidth Social Engineering Mobility Router Law Enforcement Human Resources Application Remote Monitoring Password Big Data Money App Encryption History Applications Data Breach Mobile Computing Blockchain Private Cloud Remote Computing Paperless Office How To Managed IT Mobile Office Apps Data Storage Patch Management Office Tips Training VPN Government Avoiding Downtime Website Budget Data Security Two-factor Authentication Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Vulnerability Windows 7 Wireless Word Flexibility Google Drive Marketing Servers WiFi Gmail IT solutions Entertainment Settings Firewall USB Vendor Managed Services Virtual Reality Display Apple Telephone System Staff Software as a Service Save Time Social Machine Learning Connectivity Remote Work Employee/Employer Relationship User Error RMM Meetings Cleaning Conferencing Risk Management End of Support Hacker Education Physical Security Scam Safety The Internet of Things Data Protection HIPAA Lithium-ion battery Sports Redundancy Vendor Management Keyboard YouTube Charger Business Technology Black Market Content Management Managed Services Provider Fax Server Access Control Compliance Computer Care Database OneNote Virtual Assistant Current Events SaaS Document Management Telephony IT Consultant Authentication Remote Workers Wireless Technology Samsung Solid State Drive How to Downtime Processor Humor Network Congestion Value eWaste Data storage Hard Drive Update Automobile Spam Blocking Electronic Medical Records Google Docs Computing Infrastructure Computing Hiring/Firing Identity Theft Going Green Wearable Technology Hard Drives Retail Instant Messaging Robot Excel Battery Augmented Reality Digital Signage Biometrics Shadow IT Fraud Virus Virtual Desktop Legal Business Intelligence Remote Worker Audit Internet Exlporer Worker Unified Threat Management Computer Accessories DDoS IT Management Cryptocurrency Procurement Net Neutrality SharePoint Botnet Workplace Strategy PDF IT Plan Comparison Help Desk Proactive IT Printing Unsupported Software CES Printer Customer Service Environment Bluetooth Best Practice Evernote Cryptomining Antivirus Experience Point of Sale Wire Personal Scalability Software Tips Supply Chain Management Supercomputer Printer Server Travel Windows 8 Business Owner Sync Printers Monitoring Emails Batteries Millennials IT service NarrowBand Wireless Charging Windows 8.1 Smart Office Digitize Search Windows Server 2008 R2 Tablet Virtual Private Network Customer relationships iPhone Netflix Two Factor Authentication Workforce Domains Cables Manufacturing Email Best Practices Root Cause Analysis IT Assessment HBO Knowledge IaaS Music Maintenance Bloatware Skype Project Management Computer Tips Files Nanotechnology Managed IT Service Telecommuting Security Cameras Chromecast Cortana Biometric Security Virtual CIO Data loss OneDrive Outlook Peripheral Leadership Digital Signature Troubleshooting Tablets Entrepreneur Start Menu Warranty Digital Security Cameras Colocation Using Data Uninterrupted Power Supply Copiers Loyalty Google Apps 5G Screen Mirroring HVAC Consultant Frequently Asked Questions Quick Tip Monitor Analysis Analytics Books Shortcut Smartwatch Cost Management Mobile Administrator Ergonomics Windows 10s Devices Development OLED Social Networking Cast Enterprise Content Management Best Available Tip of the week MSP WIndows 7 PCI DSS Reputation webinar Accountants Virtual Machine Streaming Media Emergency Employee Content Professional Services Microchip 2FA Public Cloud Thought Leadership Fiber Optics Tech Support Employer Employee Relationship Credit Cards Messaging Laptop Assessment Password Manager Cabling Running Cable Techology Password Management Memory Windows Server 2008 Policy Customers Hypervisor Multi-Factor Security Audiobook Tools Search Engine Dark mode Twitter Trend Micro SMS Touchpad Television Business Mangement Default App NIST User Procedure Smart Tech PowerPoint Saving Time Trending Windows Media Player Google Search Politics dark theme Advertising Addiction Shopping Amazon AI Public Computer Recycling IT Infrastructure Science Regulations Wiring Managing Stress FinTech Practices Notifications Transportation Bing Computer Fan Cache Social Network Rootkit Amazon Web Services Safe Mode Criminal Cameras Investment Distributed Denial of Service Customer Relationship Management Analyitcs GDPR Employees Relocation Workers Hosted Computing Employee/Employer Relationships Benefits Online Shopping ISP Programming Windows 365 FENG Wireless Internet Video Games File Sharing Video Conferencing IBM ROI Worker Commute Flash Camera Sales Inventory Bitcoin Smart Technology Specifications Shortcuts

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code