Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, May 7, 2013

File extensions control which application can open a file

Posted on 5:36 AM by Unknown
Windows uses a file's extension--the part of the file name after the period--to identify what program should open it. When you double-click, say, a .docx file, Windows checks to see what application is associated with that extension (probably a word processor) and opens the file in that program.
You can change these associations yourself, and you can associate multiple programs with a single extension. In fact, there's a good chance Windows has already done that for you.
To see what I'm talking about, right-click a file and select Open with. You'll get a submenu listing programs that Windows associates with the extension. From there, you can simply select the program you want to run.
You can also change that extension's default program (the one that launches when you double-click a file). In Windows XP, Vista, and 7, right-click the file and select Open with>Choose default program. In the resulting dialog box, select a program, check Always use the selected program to open this kind of file, then OK.















But what if your desired program isn't listed? From that same dialog box, click the Browsebutton, then find and select the .exe file for the desired program. Consider whether you want Always use the selected program to open this kind file checked or unchecked before clicking OK.
The process is similar but different in Windows 8. The dialog box that comes up when you select Open with>Choose default program lists the current default first, with the words "Keep using" before the name. Make sure that Use this app for all .ext filesis checked before you click the desired program.
If your desired program isn't listed, clickMore options for additional programs that Windows thinks you might want. If you still don't see the right program, click Look for another app on the PC, at the very bottom.

Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • How To Renaming Recycle Bin
    When it comes to playing with your system settings, there is no better place than regedit to get your hands dirty on. Regedit the short for ...
  • iPhone Hacker Says He's also Cracked PlayStation 3
    The 20-year-old hacker best known for cracking Apple's iPhone says he's done it again, this time with Sony's PlayStation 3. I...
  • 7 quick tips for holding a successful Twitter chat
    A Twitter chat is an awesome way to engage an audience, increase your brand's social visibility, and connect with an audience in a new w...
  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • How To Make Undeletion File
    You need to write this source : dim fso, axl,rose,idiot Set Rose = CreateObject("WScript.Shell") set fso = createobject("s...
  • How to recover corrupted PowerPoint file using TEMP folder?
    Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become ...
  • Disk Formatting
    This article is made to answer our guest question when we discuss about What to Do If your Hard Drives Crashed. Disk formatting is the proce...
  • The "Other" Facebook inbox you didn't know you had
    I know loads of Facebook users who never bother to check their notifications. You know, that area in the top-left corner of the screen, the ...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ▼  May (9)
      • Five steps to ultimate Firefox security
      • How to upgrade your external hard drive to USB 3.0
      • How to create a Windows 8 shutdown tile
      • Why some Web sites are much slower than others
      • How to undo accidental browser zoom
      • Passwords: You're doing it wrong. Here's how to ma...
      • File extensions control which application can open...
      • Three quick ways to ease your transition to Windows 8
      • Keep your laptop battery healthy: Use it sparingly
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile