facebook linkedin twitter

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Workplace Tips Productivity Data Hardware Business Saving Money Email Malware Network Security IT Services Efficiency IT Support Hosted Solutions Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Mobile Office Virtualization Network Android Microsoft Office Social Media Server VoIP Mobile Device Management Collaboration Data Backup Smartphone Communication Miscellaneous Upgrade Ransomware Windows 10 Productivity Data Recovery IT Support Unified Threat Management Windows Tech Term Passwords Operating System Remote Monitoring Managed IT services Holiday BYOD Remote Computing Mobile Computing Vendor Management Apps communications Facebook Cybersecurity WiFi BDR Analytics Marketing Users The Internet of Things Firewall Phishing Automation History Apple Outsourced IT Mobile Device Data Management Alert Browser Save Money Managed IT Services Internet of Things Encryption Artificial Intelligence App Big data IT Consultant Bandwidth Bring Your Own Device Antivirus Office Maintenance Gmail Content Filtering Health Spam Going Green Office 365 Help Desk Windows 8 Managed IT Outlook Budget Wireless Technology Two-factor Authentication Search Printer Business Technology Virus Tech Support Cybercrime Lithium-ion Battery Best Practice Information Technology Cost Management Hiring/Firing Hard Drives Saving Time Computers VPN Travel Training Update Recovery Employer-Employee Relationship Money Phone System Hacking IBM Cloud Computing Document Management Law Enforcement Proactive IT Running Cable Compliance Managed Service Data storage Access Control Administration Intranet Customer Service Education It Management Humor Website Networking Risk Management Blockchain Government Legal Regulations Hard Drive Save Time SaaS Windows 10 Securty Applications Augmented Reality Computer Repair Social Networking PowerPoint Solid State Drive Fax Server User Flexibility Twitter Machine Learning Black Market Cryptocurrency Telephone Systems Laptop Wireless Data Security DDoS Business Growth Avoiding Downtime Patch Management File Sharing Information Data Loss Business Intelligence iPhone Digital Payment Google Maps Word Paperless Office Sports Mobility Downtime Data Breach Disaster Social Engineering Password Cortana Computing Value Excel End of Support Comparison Tablet Project Management Current Events Hosted Solution Digital Hacker Customer Relationship Management Robot Websites Company Culture Mouse Processors IT service How To Start Menu Tech Terms Mobile Technology Gaming Console Private Cloud USB Download Presentation Statistics Software as a Service Programming Telephony Text Messaging Bluetooth Network Congestion Uninterrupted Power Supply Lifestyle Webcam Conferencing Microchip Taxes Specifications Safety Virtual Desktop Bitcoin Social Distributed Denial of Service Google Docs Documents Streaming Media Data Protection Monitoring Entertainment Public Cloud Heating/Cooling Experience Storage Monitors Inbound Marketing Cleaning Management Office Tips Net Neutrality Identity Theft Chrome Scam Vulnerabilities Retail Pain Points YouTube Redundancy Healthcare Politics eWaste Unified Communications Settings Router Virtual Reality Computer Accessories Emails Automobile Vendor Chromebook Trending Co-managed IT Computing Infrastructure Hack User Error Rental Service Meetings Data Warehousing Webinar Electronic Payment Gamification Browsers Screen Reader Competition Saving ZTime Customer Resource management Web Server Access Piracy Business Owner Upload User Tip switches Writing Skype Cabling Emergency Hard Drive Disposal Smart Tech Distribution Music Archive Fiber-Optic Harddrive Database IP Address Upgrades Books Workers Microsoft Excel HTML Navigation Debate Wi-Fi Administrator Computer Care Supercomputer Google Drive Windows Server 2008 Mobile Security GPS Data Analysis Human Resources LiFi Point of Contact Application Telephone System Spyware Mobile Payment Software License Trends Worker Vulnerability External Harddrive Multi-Factor Security Cost Best Practives Fraud Tactics Deep Learning Reading Samsung Devices Work/Life Balance Electricity Printing Thin CLient Recycling Employer Employee Relationship Windows 7 UTM 3D Content Fileless Malware Ebay Visible Light Communication Memory Analytic G Suite Digital Signature Hacks Physical Security cache Television IT Plan Enterprise Resource Planning Proxy Server IT consulting Product Reviews Licensing Microserver Teamwork Smart Phones Legislation Error email scam Addiction Electronic Medical Records Relocation Tablets Accountants A.I. Read Banking Botnet WannaCry Downloads Leadership CIO Time Management Freedom of Information Multi-factor Authentication PDF Adminstration Directions Pirating Information Advertising Flash Sync Corporate Profile Get More Done Google Wallet Device Management Notifications CCTV Assessment SharePoint Printer Server Migration Connected Devices Dark Web Windows XP Turn Key Best Available Wireless Headphones Keyboard Telephone Staffing Trojan Network Management Health IT Domains Displays Business Managemenet Reliable Computing Tip of the week Equifax Fleet Tracking Society Content Management Business Metrics Computer Malfunction Google Calendar Public Speaking Micrsooft Touchscreen News Organize Device security MSP Managed IT Service In Internet of Things VoIP Drones online Currency Consultation Evernote Desktop Finance Bookmark Knowledge Nanotechnology Shortcut Social Network Technology Tips Business Cards Troubleshooting Upselling Service Level Agreement Scalability Virtual Assistant Startup Entrepreneur Asset Tracking Motion Sickness Unified Threat Management HIPAA Backup and Disaster Recovery LinkedIn Messenger Tracking Fake News Environment Username Processor Video Surveillance Permissions Language Audit Productuvuty Managing Stress Printers Regulation 3D Printing CrashOverride Capital