Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Data Software Productivity Outsourced IT Managed IT Services Data Backup IT Support Business Mobile Devices Innovation Tech Term Ransomware Computer Microsoft Data Recovery Hardware Cloud Computing Small Business Google Backup Internet of Things Smartphone Efficiency Managed Service Provider Business Continuity Windows 10 Remote Monitoring Data Management Smartphones Android Paperless Office User Tips Social Media Disaster Recovery VoIP Browser Encryption IT Support Upgrade Managed IT Communication Business Management Artificial Intelligence Collaboration BYOD Phishing Windows Facebook Save Money Mobile Device Cybersecurity App Workplace Tips Windows 10 Mobile Device Management Risk Management Holiday Apps Employer-Employee Relationship Passwords Gmail Robot Server Bring Your Own Device BDR communications Applications Network Vendor Management Recovery Office 365 Saving Money Bandwidth Managed IT Services Government Firewall Document Management Unified Threat Management Wi-Fi Project Management Antivirus Information Content Filtering Compliance Money Infrastructure SaaS Data storage Telephone Systems Going Green Vulnerability Big Data Wireless Healthcare Password Chrome Automation Virtualization IT Management Hosted Solution Tip of the week Website Scam Social Blockchain Politics Virtual Reality Work/Life Balance Customer Relationship Management Miscellaneous Computing Data Security Regulations Data loss Training Office IT Service Microsoft Office Printing Computers File Sharing Unified Communications Storage Two-factor Authentication Tablet Router Analytics Remote Computing Files Help Desk Apple Quick Tips Managed Service Customer Service Hacker HIPAA IoT VPN IT solutions Access Control Digital Payment Upgrades Websites Identity Theft Wireless Technology Legal Twitter Patch Management Mobile Security Licensing Employees Sports Virtual Private Network Company Culture Network Management End of Support Health Budget Assessment Business Technology How To Monitors Server Management Information Technology Electronic Medical Records Machine Learning Mobility Operating System Alert Mouse Software as a Service Outlook Uninterrupted Power Supply Users The Internet of Things Spam Maintenance Management Google Drive YouTube How To Samsung Smart Technology Remote Monitoring and Management WiFi Settings Downtime Word Redundancy Chromebook Flexibility Remote Workers Business Growth Administration Avoiding Downtime Private Cloud Tech Support LiFi Mobile Computing Education Internet Exlporer Drones Firefox Writing Emoji Google Calendar Geography Authorization Backups Virtual Desktop Cookies PowerPoint Network Congestion Cooperation Mobile Favorites Solid State Drive Heating/Cooling IT Consulting Managed IT Service San Diego Point of Sale Fleet Tracking Procurement Deep Learning Cache Electronic Health Records Time Management Networking Specifications Test Current Events WannaCry Computer Repair Star Wars Monitoring Alt Codes Retail Cortana Legislation IT Technicians Sync High-Speed Internet Hacking Physical Security Permissions Nanotechnology Telephony Professional Services Display SharePoint Staff Public Cloud Conferencing Cryptocurrency Servers Data Breach 3D Printing Break Fix Social Networking Law Enforcement Asset Tracking Botnet Recycling Cyberattacks Processors Black Friday Roanoke — Central Technology Solutions Travel MSP RMM Marketing Security Cameras Unified Threat Management Hotspot Utility Computing Consulting Typing Buisness Mirgation Mobile Device Managment Software Tips Development Zero-Day Threat Hacks Disaster Gadgets Trending Office Tips Fraud Screen Reader Mail Merge Virtual Assistant Update Downloads Augmented Reality Automobile Computer Care Managing Stress Instant Messaging Bitcoin Technology Laws Unsupported Software Virus Dark Web Motherboard Gadget OneNote Best Practice User Error Language eWaste Read Only Touchscreen Techology Cyber Monday technology services provider Proactive Tech Terms VoIP Sponsor Remote Worker GPS Managed Services Provider Consultation Lenovo Social Engineering USB Migration Cables Backup and Disaster Recovery Smart Tech Address Wasting Time Operations Enterprise Content Management Finance Windows 8 Save Time Statistics Mobile Data Data Warehousing Employee-Employer Relationship Computing Infrastructure Supercomputer Identities Disaster Resistance Technology Assurance Group ’s 18 Crowdsourcing Meetings Theft Digital Obstacle ROI Tracking Cost Management E-Commerce Superfish Safety Technology Tips Chatbots G Suite History Wires Human Error Search Dark Data Personal Information Net Neutrality Google Wallet Multi-Factor Security Wearable Technology Google Maps Vulnerabilities Authentication Bluetooth Microsoft Excel Modem Taxes Connectivity Notes Printer Alerts IT Budget Enterprise Resource Planning Bookmarks Hard Drives Google Docs Proactive IT Notifications Distributed Denial of Service Annual Convention WPA3 Financial Spyware Course Hard Drive Features Black Market Comparison Identity Cabling Permission Humor Shortcut IT Consultant Error Cybercrime Regulation Emergency CrashOverride Web Server Cameras Motion Sickness Administrator CCTV Relocation Printers Webcam Hard Disk Drive