4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Here’s something that you might have noticed about opening Windows applications on your desktop; by default, they will generally open in a smaller window, giving you the ability to customize their size as you see fit. If you want a full size Window, it’s as easy as clicking on the maximize button in the top-right corner, but what if you didn’t want to go through this every time you open the app? There’s a solution for this, and we’ll help you find it.

The first thing you want to do is find any shortcut on your desktop. By shortcut, we are referring to any icon on your screen that opens up a program, such as Microsoft Word or your Internet browser.

Once you’ve found the icon, go ahead and right-click it. Scroll down to the bottom of the dropdown that appears and click on Properties. This opens up the Properties window, which will be--by default--on the Shortcut tab.

Next, look for the Run dropdown menu. It will be a few selections down from the top of the Shortcut tab. You’ll notice that it is set to Normal Window, but when you click the down arrow, you’ll be given the choice of Normal Window, Minimized, or Maximized. If you click on Maximized, any time you open this program in the future, it will be in full screen mode by default. Go ahead and click Apply, then close the window. If you want, go ahead and give it a shot to see it work like magic before your eyes.

It might not seem like it will save you a lot of time, but it will certainly be convenient. It’s a classic example of how spending a few moments to optimize something can make things easier. For more ways to take full advantage of your business’s technology assets and optimize your workflow, subscribe to 4IT’s blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Managed Service Provider Malware Google Business IT Services Efficiency Windows IT Support Disaster Recovery Innovation Hardware VoIP Business Continuity Network Security Workplace Tips Mobile Devices User Tips Saving Money Computer Windows 10 Miscellaneous Virtualization Mobile Device Management Upgrade Data Email Server communications Alert Mobile Computing Small Business Communication Network Save Money Microsoft Office Apps Smartphone Social Media Smartphones Managed IT Services Outsourced IT Quick Tips Browser Information Technology Productivity BYOD Going Green Mobile Office Health Gadgets Holiday Cybercrime Android Office Operating System Chrome Managed IT Cybersecurity Application Ransomware Tablet Mobility Data Backup WiFi Firewall The Internet of Things Best Practice Avoiding Downtime Passwords Disaster Risk Management Search Automation Collaboration History Data Management Remote Computing Internet of Things Unified Threat Management IT Solutions Spam Telephone Systems Data Recovery BDR User Error Remote Monitoring VPN Wireless Technology Hacking Apple Facebook Phishing Marketing Vendor Management Hard Drives Saving Time Employer-Employee Relationship Budget Recovery Phone System iPhone Customer Relationship Management Maintenance Office Tips Money Data Security Big Data Password Content Filtering Hosted Solution Computers Law Enforcement Proactive IT Vulnerability Office 365 Intranet Wearable Technology Lithium-ion battery PowerPoint Two-factor Authentication OneNote Virus Current Events Antivirus Google Drive Shortcut Social Printer Tech Support Bring Your Own Device USB IT Support Social Engineering Analytics Encryption Telephony Work/Life Balance Gmail Router Government App Humor Administration Politics Bandwidth Personal Information Printer Server Laptop SaaS Excel Wireless Audit Users Unsupported Software HaaS Trending Education Net Neutrality Windows 8 Cloud Computing Business Intelligence Data Breach Save Time Retail Identity Theft Data Protection Flexibility Outlook Windows 10 Point of Sale IT COnsultant Private Cloud Computer Repair Cost Management Applications Managed IT Services Google Docs Redundancy Data Storage Mouse Compliance hacker eWaste Transportation Social Networking Efficency Managing Stress Computer Care Battery Robot Automobile End of Support Travel Display Legal Internet Exlporer Cortana Update Customer Service Biometrics Augmented Reality Project Management Virtual Reality Paperless Office Networking Solid State Drive Meetings Sports Network Congestion Fax Server Blockchain Commerce Workplace Help Desk Instant Messaging Emails Streaming Media Samsung HIPAA Uninterrupted Power Supply Wi-Fi Entertainment Artificial Intelligence online currency Data Loss Emergency Benefits DDoS Computer Accessories Surge Protector Device Security Consultant Adobe Colocation Computer Fan Television The Blindside Of Branding Company Culture Distributed Denial of Service Black Market 3D Printing Access Devices Touchscreen Licensing Dark Web WIndows 7 Microsoft Excel IT Security Credit Cards Cleaning Screen Mirroring Storage Inbound Marketing Regulations Spyware Experience ISP Avoid Downtime Hard Drive File Sharing Keyboard FAQ Cast Value Cameras Fraud Music Programming Windows 10s Blogging Nanotechnology User Uograde Images systems Hiring/Firing Charger Science Data storage Presentation Sales Edge Tablets Books Virtual Desktop Hard Disk Drive Website Bluetooth Root Cause Analysis Video Games Best Available hack Smart Technology Wireless Charging IT Technicians HBO Document Management Ciminal NFL OneDrive best practices Advertising SharePoint CrashOverride Amazon WannaCry Mobile Device IT Management Touchpad Co-managed IT Wiring Word Managed Security data breach Teamwork Settings Information Legislation Scam Evernote WIndows Server 2008 Busines Continuity Lifestyle Near Field Communication Debate MSP Windows Ink risk management Ebay Computing Comparison Employer Employee Relationship Workers Patch Management Worker Commute Operating Sysytem IT consulting Google Maps Human Resources PDF Running Cable Scalability Files Specifications Updates IT Budget Regulation Text Messaging Reliable Computing Identities Software as a Service Safety Conferencing How To Chromecast Nokia Microsoft Word Upgrades Sync Bloatware iOS Twitter IoT Gifts Training Managed IT Service Administrator Language Webinar Tech Term Shadow IT Gift Giving Mobile IT solutions Relocation IT service Proactive Microblogging Youtube Professional Services Domains Websites Managed Service Provder Webinar Buisness Taxes Supercomputer Electronic Medical Records Tutorial Reputation