facebook linkedin twitter

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Network Security Saving Money Malware Email Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips User Tips Mobile Devices Smartphones Gadgets Business Continuity Innovation Disaster Recovery Microsoft Office Android Social Media Mobile Office Virtualization Network VoIP Data Backup Mobile Device Management Collaboration Communication Server Smartphone Data Recovery Productivity Miscellaneous Ransomware Tech Term Windows 10 Upgrade Unified Threat Management Windows IT Support Holiday Passwords Remote Monitoring Facebook communications Operating System Remote Computing Vendor Management Apps Mobile Computing Cybersecurity Managed IT services BYOD BDR Users Phishing WiFi Automation Marketing Mobile Device Analytics The Internet of Things Apple Outsourced IT Firewall History Alert Artificial Intelligence Browser Internet of Things Save Money Data Management Managed IT Services IT Consultant App Big data Encryption Gmail Office Content Filtering Bandwidth Going Green Spam Maintenance Bring Your Own Device Printer Antivirus Health Two-factor Authentication Business Technology Lithium-ion Battery Best Practice Information Technology Cybercrime Windows 8 Outlook Managed IT Windows 10 Cost Management Help Desk Wireless Technology Tech Support Virus Hiring/Firing Hard Drives Office 365 Cloud Computing Search Budget Saving Time VPN Phone System Travel Blockchain Recovery Update Training Employer-Employee Relationship IBM Hacking Money Document Management Access Control Computers Customer Service Twitter It Management Intranet SaaS Healthcare Education Government Website Risk Management Law Enforcement Applications Compliance Managed Service Data storage Save Time Hard Drive Humor Mobility Administration Proactive IT Legal Running Cable Networking Information Regulations Avoiding Downtime Social Paperless Office Data Security Wireless Current Events Sports DDoS Computing Disaster iPhone Machine Learning Hosted Solution Patch Management End of Support Data Loss Telephone Systems Robot Scam Securty Excel Word Fax Server Customer Relationship Management Data Breach Solid State Drive Business Intelligence File Sharing Password Cortana Digital Payment Augmented Reality Value Flexibility Digital Black Market Router Downtime PowerPoint Project Management Google Maps Cryptocurrency Websites Hacker Comparison Tablet Laptop Business Growth Company Culture Social Engineering Computer Repair Social Networking User Private Cloud Network Congestion Inbound Marketing Download Bitcoin YouTube Data Protection Documents Unified Communications Settings Vulnerabilities Entertainment Co-managed IT Heating/Cooling User Error Telephony Pain Points Streaming Media Microchip Taxes Storage Distributed Denial of Service IT service Vendor Net Neutrality Public Cloud Lifestyle Redundancy Retail Chrome eWaste Bluetooth Identity Theft Evernote Gaming Console Conferencing Computer Accessories Politics Start Menu Tech Terms Processors Text Messaging Virtual Reality Google Docs Webcam Trending Automobile USB Mobile Technology Monitoring Experience Emails Mouse Cleaning Chromebook Software as a Service Presentation Monitors Uninterrupted Power Supply Computing Infrastructure Hack Office Tips Safety Statistics How To Virtual Desktop Management Programming Specifications Electricity Cabling Printing Wireless Headphones Telephone Society Point of Contact Web Server Migration Directions Connected Devices Displays Leadership Books Workers Equifax SSID Fleet Tracking Adminstration Pirating Information Wi-Fi Administrator Digital Signature Windows 7 Dark Web Network Management Micrsooft Device security Processing MSP cache Teamwork Television Health IT Drones Supercomputer Recycling WannaCry Worker Downloads Nanotechnology Social Network Analytic Desktop Managed IT Service Finance Webinar Reading Corporate Profile Samsung PDF Startup Asset Tracking Permissions Language Product Reviews Time Management Business Cards Freedom of Information Bookmark Service Level Agreement Employer Employee Relationship Google Play Username G Suite Assessment Best Available Unified Threat Management SharePoint Keyboard Backup and Disaster Recovery Read Writing Upselling Licensing Google Calendar Screen Reader Customer Resource management Music Hacks Physical Security Tip of the week Processor Domains Gamification switches Relocation VoIP Tablets Smart Tech Distribution Video Surveillance Banking Botnet Touchscreen Piracy News Browsers Public Speaking Upload Upgrades Device Management Knowledge HTML Security Cameras LiFi Business Managemenet Sync Consultation Fiber-Optic User Tip Shortcut Database Best Practives Content Management Saving ZTime Technology Tips Entrepreneur Telephone System Notifications CCTV Troubleshooting Mobile Security Virtual Assistant Navigation online Currency Harddrive Reliable Computing Audit Environment Multi-Factor Security Cost Microserver Work/Life Balance Debate Business Metrics Computer Malfunction HIPAA Software License Fake News Data Analysis Trends Deep Learning Electronic Payment Devices GDPR Visible Light Communication Memory GPS In Internet of Things Fraud Data Warehousing Competition Tactics IT consulting LinkedIn Access Get More Done External Harddrive Emergency Business Owner UTM Hard Drive Disposal Tech Content Scalability Computer Care Legislation Error Turn Key Motion Sickness IT Plan Microsoft Excel Fileless Malware IP Address Enterprise Resource Planning Printer Server Thin CLient Messenger Tracking Accountants Modem Human Resources A.I. Advertising Flash Skype 3D Ebay Google Drive email scam Windows Server 2008 Proxy Server Application Addiction Trojan CIO Archive Term Organize Windows XP Spyware Mobile Payment Electronic Medical Records Staffing Google Wallet Smart Phones Rental Service Meetings Vulnerability Multi-factor Authentication Cooperation CrashOverride Medical IT Managing Stress Capital Regulation Printers 3D Printing Productuvuty

toner1