Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Change the Download Location in Chrome

Tip of the Week: How to Change the Download Location in Chrome

By default, when you download a file from the Internet, it will go to your Downloads folder, unless you specify for them to go elsewhere. While this is certainly a fine place for your downloaded files to wind up—at least for the short term—what if you wanted to change the default file location for your downloaded files? This is what today’s blog is all about: how you can change the downloaded file location for your Google Chrome web browser.

How to Change Your Downloads Location in Google Chrome

Start by opening up your Chrome web browser. Next, select the three-dot menu in the top right corner of the screen. From here, select Settings.

You should see your Settings open in a new tab in your web browser. On the left side of the screen, you’ll have an option for Advanced. When you extend this setting, you’ll see a selection for Downloads.

There are a couple of options to experiment with here. You can select a new folder to send your downloads using the first option, and you can also ask the browser to confirm where you want to send the new download whenever you initiate one. Now, whenever you download a file, the chosen folder will be the default to display in the Save As dialog box.

Once you have your downloads location selected, you can then open the folder to view any downloads as you see fit. You can then move them around the way you normally would by dragging and dropping them into the appropriate location.

What are some other tips you would like to see in the future? Be sure to reach out to us and let us know, or tell us in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Managed Service Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Current Events Productivity Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Gadgets AI Remote Work Server Managed Service Provider Miscellaneous Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Government Training Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps BYOD Vendor Mobile Device Management Chrome Gmail Managed Services Budget Voice over Internet Protocol Apple Networking App Employer-Employee Relationship Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 IT Support Tip of the week Conferencing WiFi How To BDR Operating System HIPAA Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Solutions Cybercrime Physical Security Display Printer Windows 11 Paperless Office Infrastructure Monitoring 2FA Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Settings Printing Wireless Content Filtering IT Management Hacking Employees Presentation VPN YouTube Meetings Integration Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Holidays Virtual Desktop Data storage LiFi Data Storage Word Supply Chain Smart Technology Video Conferencing Outlook Managed Services Provider Machine Learning Virtual Machines Money Saving Time Professional Services Humor Managed IT Service Maintenance Safety Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Vulnerabilities Administration Data Privacy Images 101 Multi-Factor Authentication Telephone System Mobility Robot Customer Relationship Management Cost Management Memory Vendors Alt Codes Content Wearable Technology Remote Working Competition Data Breach Health IT Google Play Be Proactive Downtime Unified Threat Management Motherboard Comparison Permissions Videos Electronic Health Records Unified Threat Management Directions Workforce Hosted Solution Assessment Wasting Time Threats Typing Trend Micro Security Cameras Workplace Strategies Network Congestion Specifications Knowledge Fraud Software as a Service Google Drive User Error Microchip User Meta Internet Exlporer Managing Costs Amazon Username eCommerce SSID Point of Sale 5G Black Friday Experience IP Address Surveillance Google Docs Virtual Assistant Outsource IT Unified Communications Database Virtual Machine Environment Bitcoin Network Management Media Running Cable Tech Support IT Technicians Reviews Google Wallet Proxy Server Medical IT Cookies Monitors Cyber Monday Hotspot Development Recovery Transportation Small Businesses Tactics Hard Drives Hypervisor Displays Windows 8 Laptop Websites Mirgation Shopping Domains Optimization Drones PowerPoint Nanotechnology Electronic Medical Records Language SharePoint Employer/Employee Relationships Outsourcing Addiction Refrigeration Management Navigation Halloween Chatbots PCI DSS Gig Economy Public Speaking Lenovo Workplace Screen Reader Writing Distributed Denial of Service Service Level Agreement Virtual Reality Computing Infrastructure Lithium-ion battery Internet Service Provider Teamwork Hiring/Firing Hacks Server Management Entrepreneur Evernote Paperless Scary Stories Private Cloud Identity Regulations Compliance Fun Memes Superfish Bookmark Co-managed IT Identity Theft Smart Tech Deep Learning Download Twitter Alerts Net Neutrality SQL Server Technology Care Undo History Business Communications Error Financial Data Social Engineering Break Fix Smartwatch IT Browsers Scams Education Connectivity Upload Remote Computing Procurement Azure Hybrid Work Cyber security Mobile Computing Social Network Tech Human Resources Multi-Factor Security Telework Search Dark Web CES Communitications Cables Tablet IoT Best Practice Trends Alert Supply Chain Management Application Managed IT Customer Resource management Term Google Apps Buisness File Sharing Regulations Dark Data Google Calendar FinTech How To Microsoft Excel IBM IT Assessment Legal Data Analysis IT Maintenance IT solutions Star Wars Business Growth Gamification Notifications Staff Flexibility Value Business Intelligence Organization Shortcuts Travel Social Networking Legislation Cortana Digital Security Cameras Smart Devices Techology Fileless Malware Ransmoware Google Maps

Blog Archive