Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, October 22 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Business Computing Privacy Email Malware Hosted Solutions IT Services Hackers Internet Productivity Managed IT Services IT Support Outsourced IT Network Security Data Software Data Backup Mobile Devices Business Computer Ransomware Microsoft Tech Term Backup Innovation Data Recovery Managed Service Provider Google Internet of Things Hardware Productivity Smartphone Cloud Computing Business Continuity Small Business Disaster Recovery Data Management Windows 10 Android Managed IT Efficiency Browser User Tips Communication Encryption Remote Monitoring Artificial Intelligence Social Media Facebook VoIP BYOD IT Support Windows Smartphones Paperless Office Save Money Mobile Device Cybersecurity Risk Management Phishing Workplace Tips Business Management App Recovery Unified Threat Management Upgrade Network Mobile Device Management Firewall Saving Money Robot Gmail Applications Government Document Management Password Virtualization Collaboration Tip of the week Big Data Project Management Chrome Wi-Fi Server Bandwidth Infrastructure BDR Hosted Solution Website Compliance Telephone Systems Money SaaS Apps Bring Your Own Device Data storage Office 365 Content Filtering Passwords Going Green Windows 10 Vendor Management Holiday Automation Politics Analytics Remote Computing Work/Life Balance Router Antivirus Two-factor Authentication Unified Communications Employer-Employee Relationship Help Desk Customer Relationship Management Apple Training Virtual Reality Data Security Data loss Vulnerability Miscellaneous Healthcare File Sharing Computing Regulations Office IT Service Files Computers Managed Service Storage IT Management Wireless Tech Support Managed IT Services Redundancy Mouse IoT Information Outlook communications How To Samsung Digital Payment Quick Tips Scam Google Drive The Internet of Things Flexibility Websites Identity Theft Settings Chromebook VPN Business Growth Smart Technology Avoiding Downtime Licensing Spam YouTube Customer Service WiFi Patch Management Mobile Computing Virtual Private Network Hacker Social Upgrades Network Management Administration Internet Exlporer Twitter LiFi HIPAA Machine Learning Mobility Assessment Business Technology Wireless Technology Legal Education Blockchain How To Server Management End of Support Health Tablet IT solutions Mobile Security Uninterrupted Power Supply Budget Remote Workers Monitors Information Technology Sports Microsoft Office Alert Printing Word Geography Mobile Data Gadgets Dark Web Motherboard Cabling Bluetooth Buisness Downloads Augmented Reality Spyware Course Cyber Monday technology services provider Fleet Tracking Proactive IT Windows 8 Save Time User Error Language Mobile Favorites Software as a Service Migration Dark Data Personal Information Identities Smart Tech Cache Electronic Health Records Safety Point of Sale Shortcut High-Speed Internet Firefox Users Data Warehousing Star Wars Monitoring Operations Telephony Google Wallet Technology Assurance Group ’s 18 Asset Tracking Sync Heating/Cooling IT Consulting Maintenance Computing Infrastructure Company Culture Conferencing Notifications Technology Tips Chatbots MSP Public Cloud Time Management Networking Hard Drives Google Docs Net Neutrality Recycling Cyberattacks Black Market Law Enforcement WannaCry Development Botnet Microsoft Excel Modem Utility Computing Consulting Writing Emoji Travel Hacking Humor Downtime Multi-Factor Security Wearable Technology Drones Distributed Denial of Service Annual Convention OneNote Network Congestion Mobile Device Managment Software Tips Servers Data Breach Backups Printer Alerts Managing Stress Deep Learning Comparison Identity Proactive Computer Repair Automobile Computer Care Solid State Drive eWaste Read Only Gadget Cables Physical Security Cookies Managed Services Provider Retail Cortana Disaster Trending Current Events Google Calendar 3D Printing GPS Mail Merge Alt Codes Virtual Desktop Managed IT Service San Diego Employee-Employer Relationship Display Technology Laws Access Control Cooperation Enterprise Content Management Specifications Remote Monitoring and Management Touchscreen Techology Cryptocurrency Management Processors VoIP Sponsor Legislation IT Technicians Wires Office Tips Supercomputer Consultation Lenovo Permissions Nanotechnology Cost Management E-Commerce Crowdsourcing Meetings Unsupported Software Virus Tracking Address Typing Break Fix Social Networking Connectivity Update G Suite History Statistics Hacks SharePoint Staff Vulnerabilities Obstacle Best Practice Black Friday Roanoke — Central Technology Solutions WPA3 Electronic Medical Records Google Maps Disaster Resistance Bitcoin Unified Threat Management Hotspot Enterprise Resource Planning Bookmarks Taxes Digital Mirgation Private Cloud IT Budget Superfish Operating System Marketing Fraud Screen Reader Hard Drive Features Social Engineering USB Search IT Consultant Regulation Error Hard Disk Drive Cybercrime Web Server Emergency CrashOverride Instant Messaging Cameras Motion Sickness Finance Administrator Printers CCTV Relocation Webcam