312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, December 15 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Network Security Hackers IT Services Software Outsourced IT Data Backup Data Productivity Hosted Solutions Managed IT Services Internet Productivity Tech Term Business Microsoft Computer Ransomware Data Recovery IT Support Innovation Backup Business Continuity Mobile Devices Cloud Computing Hardware Small Business IT Support Google Android Data Management User Tips Smartphone Remote Monitoring Communication Disaster Recovery Browser Internet of Things Managed Service Provider Managed IT Paperless Office VoIP Efficiency Encryption Workplace Tips Cybersecurity Artificial Intelligence Managed IT Services Business Management Social Media Smartphones BYOD Collaboration Windows 10 Mobile Device Government Passwords Phishing Server Save Money Windows 10 Applications Office 365 Facebook Wi-Fi Infrastructure Compliance Vulnerability IT Management Network Project Management Unified Threat Management BDR SaaS Telephone Systems Healthcare Bandwidth Upgrade Tip of the week Saving Money Recovery Holiday Document Management Risk Management Antivirus Politics Firewall Virtualization Going Green Scam Data loss Managed Service Vendor Management Virtual Reality Information Regulations Work/Life Balance Data Storage IT Service Chrome Customer Relationship Management Training Data Security Website Maintenance File Sharing Router Word Hosted Solution Office Password Robot Storage Files Wireless Gmail Help Desk Mobile Device Management Employer-Employee Relationship App Money Blockchain Two-factor Authentication Windows Redundancy Digital Payment Remote Workers Twitter Health Network Management Mobile Security Identity Theft Monitors Communications Machine Learning Licensing Analytics Server Management Apps Tablet Remote Computing The Internet of Things Electronic Medical Records VPN Quick Tips Microsoft Office Flexibility Big Data Uninterrupted Power Supply Mobility How To Virtual Private Network Unified Communications Computing Alert Business Technology Customer Service Bring Your Own Device Miscellaneous Smart Technology Outlook Automation Upgrades Computers Samsung Assessment HIPAA Internet Exlporer Remote Monitoring and Management Patch Management IoT Chromebook How To Managed IT Service Cookies Taxes Hard Disk Drive Mobile Data Sports Instant Messaging Servers User Error Cooperation Mobile Social Engineering Physical Security Augmented Reality Proactive IT Cache Spyware WPA3 Business Growth Operating System Mouse Social Networking Social E-Commerce Permissions Star Wars Tech Support Backup and Disaster Recovery Hacking Google Calendar Mirgation Wireless Technology High-Speed Internet Break Fix Nanotechnology IBM Finance Telephony Printer Staff Company Culture Safety Search Motherboard Disaster Bookmarks Touchscreen IT Consulting Hotspot Recycling Hacker Fleet Tracking Tech Terms Automobile Comparison Black Friday Features Networking Fraud Gadgets Utility Computing WiFi VoIP Network Congestion Emoji Human Error Trending Legislation Migration Development Software Tips Processors Dark Web Screen Reader Humor Authentication Websites Access Control Operations Managing Stress Apple IT Solutions Monitoring Cyber Monday Mobile Computing Cortana Legal Favorites Law Enforcement Data Breach Language eWaste End of Support Asset Tracking USB Theft Specifications Printing Personal Information Electronic Health Records Google Drive Users GPS YouTube Education MSP Permission Chatbots Cables Consulting Firefox Data Warehousing Smart Tech Office Tips Update Authorization Statistics SharePoint Wearable Technology Enterprise Content Management Google Maps Mail Merge Travel Conferencing Gadget Technology Laws Computing Infrastructure Management Supercomputer OneNote Financial History Cyberattacks Virus Avoiding Downtime Techology Net Neutrality Cost Management Tracking Settings Proactive Test Shortcut Software as a Service Identity Content Filtering Managed Services Provider Lenovo Microsoft Excel Connectivity Spam Corporate Profile Employees Bluetooth Downloads Vulnerabilities Address Distributed Denial of Service Modem Solid State Drive Unsupported Software Meetings Heating/Cooling Unified Threat Management Alerts Enterprise Resource Planning IT Budget Employee-Employer Relationship Black Market G Suite Cabling 3D Printing Computer Repair Read Only Crowdsourcing Time Management Disaster Resistance Hard Drive Digital Display RMM Technology Tips Point of Sale Notifications Consultation Superfish Computer Care WannaCry Dark Data Wires Zero-Day Threat Botnet Multi-Factor Security IT Technicians Geography Downtime Lithium-ion battery Printers Hacks Staffing 5G Sync Hard Drives IT Consultant Marketing CrashOverride Budget Regulation Relocation Mobile Device Managment Emergency Competition Administrator Cybercrime IP Address Private Cloud Information Technology Mobile Office Hiring/Firing Error Domains Cleaning Motion Sickness Fun Procurement Public Cloud Public Speaking Presentation