4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Here’s something that you might have noticed about opening Windows applications on your desktop; by default, they will generally open in a smaller window, giving you the ability to customize their size as you see fit. If you want a full size Window, it’s as easy as clicking on the maximize button in the top-right corner, but what if you didn’t want to go through this every time you open the app? There’s a solution for this, and we’ll help you find it.

The first thing you want to do is find any shortcut on your desktop. By shortcut, we are referring to any icon on your screen that opens up a program, such as Microsoft Word or your Internet browser.

Once you’ve found the icon, go ahead and right-click it. Scroll down to the bottom of the dropdown that appears and click on Properties. This opens up the Properties window, which will be--by default--on the Shortcut tab.

Next, look for the Run dropdown menu. It will be a few selections down from the top of the Shortcut tab. You’ll notice that it is set to Normal Window, but when you click the down arrow, you’ll be given the choice of Normal Window, Minimized, or Maximized. If you click on Maximized, any time you open this program in the future, it will be in full screen mode by default. Go ahead and click Apply, then close the window. If you want, go ahead and give it a shot to see it work like magic before your eyes.

It might not seem like it will save you a lot of time, but it will certainly be convenient. It’s a classic example of how spending a few moments to optimize something can make things easier. For more ways to take full advantage of your business’s technology assets and optimize your workflow, subscribe to 4IT’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Business Continuity Hardware VoIP Workplace Tips Computer User Tips Saving Money Windows 10 Miscellaneous Virtualization Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Save Money Microsoft Office Communication Network Smartphone Quick Tips communications Small Business Social Media Smartphones Information Technology BYOD Going Green Mobile Office Health Apps Android Office Managed IT Services Outsourced IT Operating System Chrome Browser Application Ransomware Gadgets Managed IT Holiday Firewall Disaster Mobility Avoiding Downtime Tablet WiFi Productivity Search Passwords Cybersecurity Best Practice The Internet of Things Data Management Risk Management Remote Computing Unified Threat Management Cybercrime IT Solutions Spam Telephone Systems BDR Apple Automation Vendor Management Hacking VPN Facebook History Hard Drives Remote Monitoring Saving Time Employer-Employee Relationship Budget Recovery Phone System User Error Collaboration Law Enforcement Office Tips Data Backup Marketing Wireless Technology Phishing Big Data Password Money iPhone Hosted Solution Customer Relationship Management Content Filtering Computers Proactive IT Data Recovery Lithium-ion battery Work/Life Balance Bring Your Own Device Office 365 Antivirus Current Events Shortcut Social Humor Administration Printer Wearable Technology USB Maintenance Analytics Encryption Telephony PowerPoint Gmail Router Virus Vulnerability Government Cost Management Windows 8 Data Protection Intranet Bandwidth Printer Server Laptop SaaS OneNote Audit HaaS Data Security Education Trending Point of Sale Business Intelligence Net Neutrality IT COnsultant Politics Personal Information Computer Repair Tech Support Social Engineering Wireless Outlook Unsupported Software Google Drive Cloud Computing Private Cloud Users App Save Time online currency Internet of Things Compliance Mouse Identity Theft Solid State Drive Data Storage Flexibility Sports Two-factor Authentication Managing Stress Excel Efficency Samsung Network Congestion Wi-Fi Emergency Artificial Intelligence Help Desk Applications Travel hacker Display Update Customer Service Biometrics Transportation Retail Augmented Reality Virtual Reality Robot Paperless Office Meetings Computer Care Battery IT Support Fax Server Automobile Instant Messaging Emails End of Support Social Networking Windows 10 Workplace HIPAA Entertainment Streaming Media Benefits Internet Exlporer Uninterrupted Power Supply DDoS Computer Accessories Managed Security Data Loss Twitter iOS Managed IT Service Branding Scam Adobe Surge Protector Distributed Denial of Service Managed IT Services Google Docs Television Computer Fan Employer Employee Relationship WIndows 7 3D Printing Inbound Marketing Operating Sysytem Licensing eWaste Storage Worker Commute Regulations PDF Microsoft Excel Dark Web Wiring Screen Mirroring Scalability Information Files Value ISP Safety Cameras Text Messaging File Sharing Debate Chromecast Cast User How To Programming Blogging Windows 10s Upgrades Science Virtual Desktop Presentation systems Nanotechnology Administrator Bluetooth Training Best Available Colocation Website Tablets IT Technicians Hard Disk Drive Consultant The Blindside Of hack Root Cause Analysis Nokia Access HBO SharePoint Company Culture Black Market OneDrive NFL best practices Touchscreen IT Security Amazon Cortana CrashOverride Co-managed IT IT Management Teamwork Cleaning Experience Busines Continuity Word data breach Settings Networking Keyboard Near Field Communication Avoid Downtime Legislation WIndows Server 2008 Lifestyle Music Ebay Windows Ink risk management Human Resources Hiring/Firing IT consulting Computing Data storage Patch Management Running Cable Books Google Maps Commerce Hard Drive Smart Technology Reliable Computing Video Games Regulation Document Management Bloatware Data Breach Advertising Software as a Service Images Legal Uograde Touchpad Sync Mobile Device Sales Gifts Managed Service Provder Taxes Webinar Redundancy Webinar Supercomputer Electronic Medical Records IT service Credit Cards Mobile Gift Giving IT solutions IT Budget Domains FAQ Reputation Professional Services Buisness Shadow IT Relocation Comparison Specifications Microblogging Tutorial Youtube Conferencing