4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Here’s something that you might have noticed about opening Windows applications on your desktop; by default, they will generally open in a smaller window, giving you the ability to customize their size as you see fit. If you want a full size Window, it’s as easy as clicking on the maximize button in the top-right corner, but what if you didn’t want to go through this every time you open the app? There’s a solution for this, and we’ll help you find it.

The first thing you want to do is find any shortcut on your desktop. By shortcut, we are referring to any icon on your screen that opens up a program, such as Microsoft Word or your Internet browser.

Once you’ve found the icon, go ahead and right-click it. Scroll down to the bottom of the dropdown that appears and click on Properties. This opens up the Properties window, which will be--by default--on the Shortcut tab.

Next, look for the Run dropdown menu. It will be a few selections down from the top of the Shortcut tab. You’ll notice that it is set to Normal Window, but when you click the down arrow, you’ll be given the choice of Normal Window, Minimized, or Maximized. If you click on Maximized, any time you open this program in the future, it will be in full screen mode by default. Go ahead and click Apply, then close the window. If you want, go ahead and give it a shot to see it work like magic before your eyes.

It might not seem like it will save you a lot of time, but it will certainly be convenient. It’s a classic example of how spending a few moments to optimize something can make things easier. For more ways to take full advantage of your business’s technology assets and optimize your workflow, subscribe to 4IT’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity VoIP Saving Money Computer Miscellaneous Virtualization Windows 10 User Tips Upgrade Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Email Save Money Microsoft Office Communication Alert Network communications Quick Tips Information Technology Social Media Smartphones BYOD Smartphone Going Green Mobile Office Health Android Office Apps Small Business Gadgets Operating System Chrome Application Ransomware Outsourced IT Browser Firewall Avoiding Downtime Productivity Disaster Managed IT Services Tablet WiFi Data Management Holiday Mobility Cybercrime The Internet of Things Passwords Remote Computing Telephone Systems Unified Threat Management IT Solutions Spam Managed IT BDR Risk Management Cybersecurity Search Best Practice VPN Apple Facebook Employer-Employee Relationship Vendor Management Budget Hard Drives Automation Saving Time Hacking History Remote Monitoring Collaboration Phishing Wireless Technology Password Hosted Solution Computers Big Data Marketing Phone System Recovery Proactive IT Office Tips User Error iPhone Customer Relationship Management Law Enforcement PowerPoint Shortcut Virus Data Backup Social Office 365 Current Events Telephony Money Printer Bring Your Own Device USB Content Filtering Analytics Encryption Router Gmail Data Recovery Humor Administration Wearable Technology Lithium-ion battery Maintenance Antivirus Printer Server Business Intelligence Laptop Users OneNote Data Security Windows 8 Trending Social Engineering Education Net Neutrality Wireless Tech Support Unsupported Software Private Cloud Cloud Computing Google Drive Outlook Point of Sale IT COnsultant Save Time Computer Repair App Government Cost Management Audit Intranet HaaS Work/Life Balance Bandwidth Travel Samsung Social Networking Wi-Fi Emergency Efficency Update Customer Service Biometrics Applications Retail Virtual Reality hacker Politics Meetings Personal Information Transportation Display Emails Computer Care Battery Instant Messaging Robot Augmented Reality HIPAA Entertainment Automobile Benefits End of Support Network Congestion Paperless Office DDoS Computer Accessories IT Support Help Desk Fax Server Mouse Internet Exlporer Windows 10 Compliance Workplace Streaming Media Internet of Things Vulnerability Two-factor Authentication Identity Theft Data Protection Uninterrupted Power Supply Solid State Drive Managing Stress online currency SaaS Flexibility Excel Data Storage IT Technicians How To Chromecast Dark Web Hard Drive Screen Mirroring Upgrades SharePoint Artificial Intelligence ISP Training Administrator Images Colocation Cast Consultant Uograde Blogging The Blindside Of Teamwork Windows 10s Programming Nanotechnology Busines Continuity Company Culture Black Market Access Networking Near Field Communication Touchscreen Website IT Security Tablets Hard Disk Drive Root Cause Analysis Cleaning Human Resources HBO IT consulting Experience Keyboard Running Cable Avoid Downtime NFL best practices OneDrive CrashOverride Amazon Wiring IT Management Reliable Computing Information Co-managed IT Music Hiring/Firing Word data breach Settings Debate Bloatware Data storage WIndows Server 2008 Books Ebay Smart Technology Video Games Windows Ink risk management Computing Document Management Data Breach Branding Advertising Patch Management Distributed Denial of Service Legal Google Maps Touchpad Commerce Mobile Device Managed Security Regulation WIndows 7 Nokia Scam eWaste Inbound Marketing Regulations Sync Value Employer Employee Relationship Twitter Data Loss Sports iOS Operating Sysytem Managed IT Service Cameras Worker Commute Surge Protector PDF Adobe User Managed IT Services Television Scalability Science Files Computer Fan Virtual Desktop Presentation 3D Printing Safety Bluetooth Text Messaging Licensing Best Available Microsoft Excel Reputation Gift Giving Mobile IT solutions Microblogging File Sharing Youtube Buisness Professional Services Sales Managed Service Provder Webinar Shadow IT Relocation Lifestyle Tutorial Software as a Service Storage Taxes IT service Supercomputer Electronic Medical Records Domains Google Docs IT Budget Webinar