facebook linkedin twitter

Computerware Blog

Tip of the Week: Personalizing Your Windows 10 Desktop

Tip of the Week: Personalizing Your Windows 10 Desktop

While Windows 10 is inarguably the better choice of OS over Windows 7 (especially now that the latter has officially gone the way of the dodo), the experience is made even better with the right customizations made to the settings. Let’s go through some changes you might want to make as you’re starting off (or even later on).

Personalize the Desktop

Learning a new operating system is usually a chore in and of itself, but this isn’t usually the case with Windows 10. Its appearance follows the style of Windows 8.1, 7, all the way back to Vista. There are, however, some key differences. For instance, those versions had system shortcuts set up on the desktop, but in Windows 10, all you seem to get by default is the Recycle Bin.

Changing this is simple, and you can make your desktop design as a whole suit you better while you’re at it. All you have to do is change your theme, which can be found with most of your display settings. First, access the Personalize menu by right-clicking on the desktop.

One simple change is to just add a new Background, using an image or simply shifting to a different color. This is one place where you can have a lot of fun. Another important change can be found in the Themes menu, under the Desktop icon settings.  This is where you can select which desktop apps you want appearing on the desktop, like a shortcut to your control panel, My Computer, or any other application.

Personalize the Taskbar

As the place where you access crucial elements like the Start menu, task view, notifications hub, and Cortana, the taskbar is pretty important in Windows 10. The taskbar is another place you will want to adjust some things, and luckily, you very much can.

All you have to do is right-click on the taskbar, which brings you to the Taskbar menu. Pro tip: it is actually in the same Settings page we just went over, so you can save time and select Taskbar from the menu there. You’ll have ample options to adjust the taskbar, including locking it in place, hiding it outright when not using it, turn the mouse-over preview on and off, and many other more changes.

You can also take a few moments to change the settings and Select which icons appear on the taskbar, or select preferred applications to Pin to taskbar, adding to their convenience.

Personalize Your Default Programs

Finally, you should avoid some future frustration by identifying which programs you want certain tasks to default to. Otherwise, you may open one of the alternative programs available instead, wasting time and effort.

To change these settings, click on the Start Button, and then navigate to Settings, Apps, and finally, Default apps. This will show you, well, the files and applications that certain processes will go to first. Switching these is pretty easy: click on the function you want to change, select the application (or find a new one in the Microsoft Store), and click on the icon to set it as your new default.

Windows 10 is going to be here for some time, so it only makes sense to get as comfortable as possible with it. Customizing your settings is a very effective way to do that. To learn more ways to get the most out of your technology, visit our blog more often! Subscribe to be notified of each new post.

The Potential Detriments of Migrating to the Cloud
Don’t Be Dumb About Smart Technology


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 18, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Hackers Data Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Business Productivity Hosted Solutions Email Malware IT Services Saving Money Efficiency Computer Productivity User Tips Google IT Support Small Business Smartphones Innovation Mobile Devices Data Backup Quick Tips VoIP Network Gadgets Collaboration IT Support Business Continuity communications Microsoft Office Android Upgrade Social Media Data Recovery Server Disaster Recovery Mobile Office Cybersecurity Virtualization Communication Smartphone Miscellaneous Mobile Device Management Phishing Holiday Ransomware Windows 10 Operating System Vendor Management Tech Term Passwords Windows Apps Managed IT Services Facebook Remote Monitoring Unified Threat Management Outsourced IT Internet of Things Mobile Device BDR Automation Analytics Managed IT services Mobile Computing Users BYOD Data Management Remote Computing Apple Windows 10 WiFi Marketing Artificial Intelligence History The Internet of Things Firewall Browser Cloud Computing Save Money Alert Help Desk Big data App Business Technology Encryption Spam Office 365 Training IT Consultant Two-factor Authentication Bandwidth Managed IT Government Office Cybercrime Bring Your Own Device Maintenance Printer Antivirus Health Hard Drives Access Control Content Filtering Information Technology Gmail Going Green Windows 8 Outlook Managed Service Recovery Employer-Employee Relationship Retail Wireless Technology Tech Support Cost Management Search Virus Information Hiring/Firing Healthcare Budget Computers Best Practice Saving Time Lithium-ion Battery VPN Windows 7 IBM Travel Blockchain Education Data Loss Update Humor Hacking Project Management Networking Money Document Management Phone System iPhone Customer Service It Management Intranet Twitter Customer Relationship Management Patch Management Solid State Drive Compliance Mobility Website Conferencing Augmented Reality Data storage PowerPoint Risk Management Data Breach Password Administration Value Legal Save Time Downtime Hacker Regulations Avoiding Downtime Running Cable Proactive IT SaaS Computing Current Events File Sharing Hard Drive Wireless Law Enforcement Applications Google Maps DDoS Storage Fax Server Social Engineering Scam Black Market Flexibility Voice over Internet Protocol Cryptocurrency Word Monitoring Laptop Private Cloud Cortana Business Growth Business Intelligence Wi-Fi Digital Digital Payment Router Management Telephony Websites Machine Learning Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Software as a Service Company Culture Sports Cooperation Vendor Disaster User Computer Repair Hosted Solution Virtual Desktop End of Support Social Networking Social Robot Data Security Securty Excel Entertainment Teamwork Heating/Cooling Distribution Professional Services Virtual Reality Downloads Politics Bluetooth Streaming Media Automobile Lifestyle Emails Gaming Console Chromebook Redundancy Smart Devices Computing Infrastructure Hack Memory How To eWaste Text Messaging Google Docs Net Neutrality Meetings Webcam Experience Chrome Download Managed Services Provider Evernote Virtual Assistant Cleaning Monitors Office Tips Multi-factor Authentication Telephone Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Distributed Denial of Service USB Managed IT Service Inbound Marketing Mobile Technology YouTube Unified Communications Settings Trending Presentation Public Cloud Licensing Uninterrupted Power Supply Mouse Specifications Safety Pain Points Vulnerability Processor Bitcoin Programming Co-managed IT Identity Theft Statistics User Error Network Congestion Documents Data Protection IT service Reliable Computing Upselling Solutions Music Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine cache Television switches Writing Smart Tech eCommerce IT Fiber-Optic Database In Internet of Things Data Analysis Employees Video Surveillance WannaCry Upgrades HTML Analytic Telephone System PDF SQL Server Corporate Profile Recycling Mobile Security GDPR Saving ZTime Managing Risk Time Management Freedom of Information LiFi Scalability Integration Software License Trends Motion Sickness Best Available Keyboard Tech Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Harddrive Holidays Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Hybrid Cloud Debate Google Calendar Deep Learning Devices Best Practives Messenger Tracking Domains Visible Light Communication Proxy Server GPS Azure VoIP UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Microserver Web Server Shortcut External Harddrive Term Consultation IT consulting Recording Optimization Content Management Communitications email scam Addiction Administrator Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Advertising Flash Environment Dark Web 3D Free Resource Ebay Audit CIO Get More Done Supercomputer HIPAA SSID Thin CLient How To Fake News Wireless Headphones Printer Server Worker Electronic Payment Health IT Employee/Employer Relationship Staffing Google Wallet online Currency Migration Connected Devices Turn Key Competition Smart Phones Processing Managed Services Data Warehousing Windows XP Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal Society IT Assessment Network Management Wasting Time Access Displays Equifax Trojan Fleet Tracking Reading Samsung Microsoft Excel Organize G Suite Bookmark Adminstration Pirating Information Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Leadership Cyber security Nanotechnology Social Network Human Resources Employer/Employee Relationships Drones Desktop Finance Hacks Physical Security Application Google Play Telephone Service Google Drive Windows Server 2008 Microsoft 365 Archive Electronic Health Records Business Cards Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets Permissions Language Memes Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Printing Username Medical IT Trend Micro Point of Contact Screen Reader Webinar Customer Resource management User Tip Proactive Maintenance Gamification Notifications CCTV Digital Signature Security Cameras Threats Surveillance Printers Managing Stress CrashOverride Regulation 3D Printing Capital Personal Information Productuvuty Financial