facebook linkedin twitter

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email Network Security IT Services IT Support Hosted Solutions Google Small Business Efficiency Smartphones User Tips Gadgets Computer Quick Tips Mobile Devices Business Continuity Disaster Recovery Mobile Office Virtualization Network Microsoft Office Innovation Social Media Android Server VoIP Mobile Device Management Smartphone Miscellaneous Upgrade Ransomware Windows 10 Communication Unified Threat Management Collaboration Windows Remote Monitoring Data Recovery Operating System Tech Term Data Backup Passwords Mobile Computing BYOD Remote Computing Managed IT services IT Support Holiday Facebook Cybersecurity WiFi Vendor Management communications Apps Marketing The Internet of Things Analytics Automation BDR History Users Apple Firewall Outsourced IT Internet of Things Productivity Alert Data Management Managed IT Services Phishing Save Money App IT Consultant Artificial Intelligence Mobile Device Big data Bring Your Own Device Antivirus Gmail Spam Bandwidth Maintenance Browser Health Content Filtering Going Green Office Budget Windows 8 Outlook Wireless Technology Two-factor Authentication Search Printer Hiring/Firing Virus Hard Drives Tech Support Managed IT Cybercrime Encryption Best Practice Information Technology Cost Management Lithium-ion Battery Help Desk Money Document Management Training Recovery Employer-Employee Relationship Computers Travel Phone System Hacking IBM Update Cloud Computing Office 365 Access Control SaaS Save Time Customer Service It Management Administration Humor Business Technology Law Enforcement Government Website Compliance Running Cable Proactive IT Data storage Saving Time VPN Hard Drive Windows 10 Intranet Networking Education Legal Regulations Risk Management PowerPoint User Sports Business Intelligence Computing Disaster Fax Server End of Support Hosted Solution Digital Payment Data Security Robot Wireless Downtime DDoS Machine Learning Securty Comparison Tablet Telephone Systems Patch Management Blockchain Data Loss Company Culture Solid State Drive Computer Repair Avoiding Downtime Social Networking Flexibility Word Black Market Data Breach File Sharing iPhone Password Cortana Laptop Twitter Project Management Business Growth Applications Mobility Excel Current Events Hacker Social Engineering Customer Relationship Management Augmented Reality Paperless Office Unified Communications Settings Net Neutrality How To Gaming Console Uninterrupted Power Supply Download Virtual Desktop Monitoring Chrome Private Cloud Lifestyle Specifications Safety Text Messaging Social Webcam Bitcoin Data Protection Documents Vendor Router Telephony Information Taxes IT service Heating/Cooling Management Computer Accessories Distributed Denial of Service Storage Vulnerabilities Trending Inbound Marketing Bluetooth Healthcare Mouse Public Cloud Scam Redundancy Retail eWaste Programming Cryptocurrency Statistics Identity Theft Network Congestion Value Pain Points Google Docs Digital Google Maps Experience Monitors Politics Websites Cleaning Virtual Reality Processors Managed Service Streaming Media Emails Co-managed IT Automobile Start Menu User Error Tech Terms Office Tips Chromebook Mobile Technology USB Conferencing Hack YouTube Software as a Service Presentation Computing Infrastructure Micrsooft Health IT Human Resources Devices Rental Service Meetings Google Drive Windows Server 2008 Application Fraud Tactics UTM Content Web Server Debate Spyware Mobile Payment Device Management Cabling Harddrive Vulnerability Drones Business Managemenet Wi-Fi Administrator GPS Electricity Printing Legislation Error Content Management Books Workers IT Plan Enterprise Resource Planning Best Practives Accountants A.I. Supercomputer External Harddrive Permissions Windows 7 Language Digital Signature email scam Addiction Multi-factor Authentication Microchip cache Television Teamwork online Currency Worker Entertainment 3D Ebay WannaCry switches Downloads Writing Wireless Headphones Telephone Reading Samsung Thin CLient Music Microserver Migration Connected Devices Corporate Profile Upgrades PDF User Tip Equifax Fleet Tracking Employer Employee Relationship Smart Phones Time Management Freedom of Information Network Management LinkedIn G Suite Device security MSP Hacks Physical Security Assessment LiFi SharePoint Best Available Keyboard Licensing Get More Done Skype Banking Botnet Adminstration Pirating Information Printer Server Google Calendar Nanotechnology Social Network Archive Relocation Tablets Leadership Turn Key Tip of the week Domains Desktop Finance VoIP Trojan Deep Learning Startup Asset Tracking Touchscreen News Work/Life Balance Public Speaking Business Cards Service Level Agreement Sync Username Point of Contact Notifications CCTV Consultation Visible Light Communication Organize Evernote Memory Shortcut Unified Threat Management Backup and Disaster Recovery Knowledge Business Metrics Computer Malfunction IT consulting Technology Tips Entrepreneur Screen Reader Customer Resource management Reliable Computing Virtual Assistant Troubleshooting Gamification Audit Environment Smart Tech Distribution Fake News HIPAA Piracy Upload In Internet of Things Electronic Payment Electronic Medical Records HTML Analytic Advertising Data Warehousing Flash Competition Fiber-Optic Database Recycling Upselling CIO Product Reviews Motion Sickness Video Surveillance Access Windows XP Webinar Telephone System Scalability Staffing Emergency Google Wallet Hard Drive Disposal Business Owner Mobile Security Computer Care Displays Multi-Factor Security Cost Read Messenger Tracking Saving ZTime Society Microsoft Excel IP Address Software License Trends Regulation CrashOverride Printers 3D Printing Capital Managing Stress Productuvuty

toner1