Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, December 13 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Productivity Managed IT Services Network Security Outsourced IT Data Software IT Support Data Backup Business Mobile Devices Tech Term Productivity Computer Microsoft Ransomware Innovation Data Recovery Backup Hardware Business Continuity Smartphone Google Internet of Things Managed Service Provider Cloud Computing Small Business Disaster Recovery Windows 10 Remote Monitoring Android Data Management Social Media Artificial Intelligence Managed IT User Tips Smartphones Communication Efficiency Browser Encryption Paperless Office IT Support Windows BYOD Facebook VoIP Upgrade Risk Management Business Management Workplace Tips Mobile Device Management Collaboration Phishing App Cybersecurity Save Money Mobile Device Government Unified Threat Management Firewall Applications Recovery Gmail Windows 10 Server Wi-Fi BDR Network Robot Saving Money Bandwidth Hosted Solution Vulnerability Holiday Website Healthcare Document Management Apps Content Filtering Passwords Virtualization IT Management Managed IT Services Money Data storage Tip of the week Bring Your Own Device Going Green Big Data Project Management Antivirus Compliance Vendor Management Chrome Wireless Office 365 Telephone Systems Password Infrastructure SaaS Data Security Analytics Remote Computing Data loss Office IT Service Computers Storage Politics Apple Work/Life Balance Automation Managed Service Two-factor Authentication Information Help Desk Router Customer Service Computing communications Training Virtual Reality Unified Communications Employer-Employee Relationship File Sharing Miscellaneous Customer Relationship Management Blockchain Files Regulations Google Drive Network Management Mobile Security Assessment Business Technology Administration Monitors Settings Tech Support Microsoft Office Alert Education Server Management Electronic Medical Records Business Growth LiFi How To Remote Monitoring and Management Digital Payment Mobile Computing IT solutions Uninterrupted Power Supply Websites Identity Theft How To Samsung Social Remote Workers Hacker Licensing Wireless Technology Legal Flexibility Sports Word Chromebook The Internet of Things Redundancy IoT Avoiding Downtime Maintenance Smart Technology Quick Tips Scam Machine Learning Mobility Upgrades Budget Twitter Users Information Technology VPN Operating System Tablet Printing Spam Patch Management Internet Exlporer YouTube HIPAA Outlook WiFi Mouse End of Support Health Downtime Virtual Private Network Identities Proactive Tech Terms Google Maps Office Tips Specifications eWaste Read Only Taxes Backup and Disaster Recovery Private Cloud IT Budget Unsupported Software Legislation Virus IT Technicians Managed Services Provider Disaster Trending Update Permissions Nanotechnology Cables Mail Merge SharePoint Staff Employee-Employer Relationship Technology Laws Cabling Break Fix Social Networking Enterprise Content Management Google Wallet Finance Hotspot Hard Drives Google Docs Virtual Desktop Touchscreen Techology Black Friday Roanoke — Central Technology Solutions Management VoIP Sponsor Social Engineering Unified Threat Management USB Wires Human Error Consultation Lenovo Mobile Data Mirgation Cost Management E-Commerce Humor Point of Sale Fraud Screen Reader Address Downloads Augmented Reality Connectivity Backups Statistics Dark Web Motherboard Vulnerabilities Drones Authentication User Error Language Solid State Drive WPA3 Disaster Resistance Sync Dark Data Personal Information Cyber Monday technology services provider Deep Learning Enterprise Resource Planning Bookmarks Digital Obstacle Telephony Safety Permission Superfish Public Cloud Software as a Service Migration Hard Drive Current Events Features Search Law Enforcement Smart Tech Botnet Notifications Operations Marketing Bluetooth Travel Data Warehousing Alt Codes Geography Authorization Black Market Computing Infrastructure Cryptocurrency Fleet Tracking Gadgets Proactive IT Mobile Device Managment Software Tips Technology Assurance Group ’s 18 Mobile Favorites Buisness Spyware Course Test Automobile Computer Care Technology Tips Chatbots Cache Electronic Health Records Shortcut Gadget Writing Emoji Net Neutrality Firefox Multi-Factor Security Wearable Technology Star Wars Hacks Monitoring Network Congestion Microsoft Excel Modem Typing High-Speed Internet Employees GPS Printer Alerts Bitcoin Asset Tracking Heating/Cooling IT Consulting Computer Repair Distributed Denial of Service Annual Convention Best Practice Company Culture Conferencing MSP RMM Time Management Networking Physical Security Comparison Identity Recycling Cyberattacks WannaCry Retail Cortana Supercomputer 3D Printing Google Calendar Utility Computing Consulting Hacking Crowdsourcing Meetings Display Cookies Development Zero-Day Threat Tracking Access Control Processors Cooperation Windows 8 OneNote Save Time Servers Data Breach G Suite History Managed IT Service San Diego Managing Stress Instant Messaging Webcam Theft Printers IT Consultant Error Cybercrime Financial Web Server Procurement Regulation Hard Disk Drive Cameras Motion Sickness Administrator CCTV Emergency Relocation CrashOverride