facebook linkedin twitter

Computerware Blog

Tip of the Week: Personalizing Your Windows 10 Desktop

Tip of the Week: Personalizing Your Windows 10 Desktop

While Windows 10 is inarguably the better choice of OS over Windows 7 (especially now that the latter has officially gone the way of the dodo), the experience is made even better with the right customizations made to the settings. Let’s go through some changes you might want to make as you’re starting off (or even later on).

Personalize the Desktop

Learning a new operating system is usually a chore in and of itself, but this isn’t usually the case with Windows 10. Its appearance follows the style of Windows 8.1, 7, all the way back to Vista. There are, however, some key differences. For instance, those versions had system shortcuts set up on the desktop, but in Windows 10, all you seem to get by default is the Recycle Bin.

Changing this is simple, and you can make your desktop design as a whole suit you better while you’re at it. All you have to do is change your theme, which can be found with most of your display settings. First, access the Personalize menu by right-clicking on the desktop.

One simple change is to just add a new Background, using an image or simply shifting to a different color. This is one place where you can have a lot of fun. Another important change can be found in the Themes menu, under the Desktop icon settings.  This is where you can select which desktop apps you want appearing on the desktop, like a shortcut to your control panel, My Computer, or any other application.

Personalize the Taskbar

As the place where you access crucial elements like the Start menu, task view, notifications hub, and Cortana, the taskbar is pretty important in Windows 10. The taskbar is another place you will want to adjust some things, and luckily, you very much can.

All you have to do is right-click on the taskbar, which brings you to the Taskbar menu. Pro tip: it is actually in the same Settings page we just went over, so you can save time and select Taskbar from the menu there. You’ll have ample options to adjust the taskbar, including locking it in place, hiding it outright when not using it, turn the mouse-over preview on and off, and many other more changes.

You can also take a few moments to change the settings and Select which icons appear on the taskbar, or select preferred applications to Pin to taskbar, adding to their convenience.

Personalize Your Default Programs

Finally, you should avoid some future frustration by identifying which programs you want certain tasks to default to. Otherwise, you may open one of the alternative programs available instead, wasting time and effort.

To change these settings, click on the Start Button, and then navigate to Settings, Apps, and finally, Default apps. This will show you, well, the files and applications that certain processes will go to first. Switching these is pretty easy: click on the function you want to change, select the application (or find a new one in the Microsoft Store), and click on the icon to set it as your new default.

Windows 10 is going to be here for some time, so it only makes sense to get as comfortable as possible with it. Customizing your settings is a very effective way to do that. To learn more ways to get the most out of your technology, visit our blog more often! Subscribe to be notified of each new post.

The Potential Detriments of Migrating to the Cloud
Don’t Be Dumb About Smart Technology
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 04, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Business Management Hackers Hardware Workplace Tips Microsoft Network Security Backup Productivity Hosted Solutions Managed Service Provider Business Productivity Email Malware IT Services Saving Money Efficiency Google Small Business Computer User Tips Innovation Collaboration IT Support VoIP IT Support Quick Tips Data Backup Smartphones Network communications Mobile Devices Business Continuity Microsoft Office Disaster Recovery Data Recovery Gadgets Social Media Android Cybersecurity Upgrade Communication Mobile Office Server Phishing Smartphone Virtualization Mobile Device Management Miscellaneous Vendor Management Holiday Ransomware Windows 10 Operating System Users Managed IT Services Windows Mobile Device Outsourced IT Passwords Apps Tech Term Unified Threat Management Internet of Things Remote Monitoring Facebook Automation BDR BYOD Remote Computing Apple Data Management Analytics Mobile Computing Managed IT services WiFi Windows 10 The Internet of Things Cloud Computing Artificial Intelligence Training Marketing History Business Technology Firewall Browser Save Money Encryption App Alert Help Desk Big data Spam Managed Service Information Technology Health Office 365 IT Consultant Budget Office Two-factor Authentication Bandwidth Maintenance Windows 7 Printer Hard Drives Content Filtering Going Green VPN Gmail Bring Your Own Device Government Antivirus Managed IT Cybercrime Access Control Hiring/Firing Tech Support Virus Cost Management Best Practice Saving Time Lithium-ion Battery Computers Information Windows 8 Wireless Technology Healthcare Outlook Recovery Search Employer-Employee Relationship Retail Money Humor Remote Work It Management Data Security Document Management Hacking Covid-19 Blockchain iPhone Networking Data Loss Travel Phone System IBM Education Computing Customer Service Project Management Augmented Reality Update Hard Drive Applications Password Avoiding Downtime Value Mobility Legal Hacker Patch Management Conferencing Computer Repair Running Cable Proactive IT Regulations Twitter Vendor Data Breach Intranet Current Events Customer Relationship Management SaaS Wi-Fi PowerPoint Wireless Risk Management Law Enforcement Storage Website Compliance Administration Solid State Drive Data storage Save Time File Sharing Voice over Internet Protocol Downtime Flexibility Cryptocurrency Comparison Tablet Laptop Google Maps Cortana Business Growth Company Culture Social Engineering Social Networking Scam Paperless Office Meetings Cooperation Excel Monitoring Sports Private Cloud User Disaster Virtual Desktop Hosted Solution Telephony Management End of Support Social Digital Websites Robot Machine Learning Securty DDoS Vulnerabilities Telephone Systems Net Neutrality Software as a Service Business Intelligence Fax Server Digital Payment Black Market Router Word Notifications Bitcoin eWaste Computer Accessories Managed Services Provider Inbound Marketing Distribution Google Docs Data Protection Memory Trending Experience Politics Virtual Reality Emails How To Monitors Automobile Downloads Mouse Cleaning Managed Services Cost Office Tips Processors Employee/Employer Relationship Pain Points Chromebook Managed IT Service Statistics Programming Computing Infrastructure Hack USB Presentation Redundancy Network Congestion YouTube How To Unified Communications Settings Download Processor Evernote Specifications Smart Devices Safety Co-managed IT Virtual Assistant Streaming Media User Error Multi-factor Authentication Telephone Documents Video Conferencing Gaming Console Microchip Taxes Entertainment Start Menu Tech Terms Solutions IT service Distributed Denial of Service Teamwork Heating/Cooling Professional Services Webcam Mobile Technology Text Messaging Lifestyle Public Cloud Licensing Chrome Uninterrupted Power Supply Integration Bluetooth Vulnerability Identity Theft CCTV Public Speaking Modem Smart Phones Strategy Screen Reader Customer Resource management Deep Learning Electricity Proxy Server Printing Azure Gamification online Currency Work/Life Balance Term Smart Tech Microserver Reliable Computing Electronic Health Records Electronic Medical Records Transportation Piracy Upload Visible Light Communication Business Metrics Computer Malfunction Shortcut Financial Data Display Adminstration Pirating Information HTML LinkedIn Troubleshooting Memes Recording Optimization Leadership Fiber-Optic Database IT consulting In Internet of Things Entrepreneur cache Directions Television HIPAA SSID Telephone System Get More Done Environment Managing IT Services WannaCry Dark Web Free Resource Mobile Security Time Management Processing Freedom of Information Multi-Factor Security Skype CIO Turn Key Scalability Electronic Payment Surveillance Corporate Profile Health IT Software License Trends Archive Advertising Flash Printer Server Motion Sickness Competition Telework Assessment SharePoint Wasting Time Devices Staffing Google Wallet Messenger Tracking Business Owner IT Logistics Virtual Machines Fraud Tactics Windows XP Trojan Remote Workers Society Organize Rental Service IP Address Tip of the week Cyber security Point of Contact Displays Virtual Private Network Bookmark Google Calendar UTM Content Application FinTech Touchscreen Google Play News Telephone Service Legislation Error Micrsooft Cabling Development Human Resources VoIP Employer/Employee Relationships Upselling IT Plan Enterprise Resource Planning Web Server Consultation Managing Costs Video Surveillance Accountants A.I. Drones Books Workers Knowledge Microsoft 365 email scam Addiction Administrator Data Storage Supercomputer Medical IT Trend Micro Saving ZTime Analytic Procurement Browsers Technology Tips Recycling Digital Signature Organization Security Cameras Fake News Threats Wireless Headphones Product Reviews Worker User Tip Audit Proactive Maintenance Migration Connected Devices Permissions Language Webinar Navigation Data Warehousing Virtual Machine Debate Equifax Fleet Tracking Reading Samsung Communitications Harddrive Network Management Read PCI DSS Music Employer Employee Relationship Emergency Hard Drive Disposal eCommerce switches Writing G Suite Supply Chain Management Access Data Analysis Employees GPS Device security MSP Physical Security GDPR External Harddrive Microsoft Excel Managing Risk Nanotechnology Social Network Upgrades PDF Internet Service Provider Printers Computer Care SQL Server Desktop Finance Device Management Hacks Google Drive Tech Windows Server 2008 Hypervisor Startup Asset Tracking Business Managemenet Relocation Tablets IT Assessment Business Cards Service Level Agreement Content Management LiFi Banking Botnet Best Available Keyboard Regulations Compliance Ebay Username Domains Holidays Thin CLient Unified Threat Management Backup and Disaster Recovery Best Practives Sync Remote Working Spyware Fileless Malware Mobile Payment Hybrid Cloud 3D 3D Printing Managing Stress Regulation CrashOverride Personal Information Financial Capital Productuvuty

toner1