312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, June 16 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Network Security IT Services Malware Email Hackers Privacy Hosted Solutions Data Data Backup Outsourced IT Software Internet Managed IT Services Productivity Innovation Business Microsoft Data Recovery Tech Term Ransomware IT Support Computer Cloud Computing Hardware Small Business Business Continuity User Tips Backup IT Support Mobile Devices Business Management Google Collaboration Efficiency Communication Managed IT Services Android Paperless Office Remote Monitoring Windows 10 VoIP Managed Service Provider Smartphone Phishing Upgrade Disaster Recovery Smartphones Server Internet of Things Workplace Tips Data Management Cybersecurity Passwords Browser Managed IT Mobile Device Office 365 Encryption BYOD Holiday Social Media Save Money Artificial Intelligence Windows 10 Communications Facebook Employer-Employee Relationship Compliance Quick Tips Document Management Managed Service Saving Money Risk Management Applications Business Technology Government Wi-Fi Unified Threat Management SaaS BDR Healthcare Antivirus Telephone Systems Vulnerability Bandwidth Microsoft Office File Sharing Automation IT Management Scam Analytics Project Management Password Virtualization Recovery Help Desk Network Chrome Blockchain Vendor Management Windows Information Infrastructure Tip of the week Work/Life Balance Bring Your Own Device IT Service Office Hosted Solution Training Robot Storage Apps Gmail App Router Maintenance Customer Relationship Management Word VPN Website Files Going Green Money Data Storage Regulations Wireless Data Security Politics Firewall Mobile Device Management Data loss Tablet Virtual Reality Two-factor Authentication Assessment Electronic Medical Records Outlook Patch Management Upgrades Computers Mobility How To Proactive Consultation Unified Communications Uninterrupted Power Supply Employees Redundancy The Internet of Things Computing Alert Smart Technology Network Management Gadgets Management Remote Monitoring and Management How To RMM Net Neutrality Settings Big Data Server Management HIPAA Monitors Samsung Remote Workers Users Miscellaneous Networking Customer Service Internet Exlporer IoT Access Control Virtual Private Network Downtime Chromebook Cooperation Twitter Digital Payment Mobile Security Identity Theft Health Flexibility Social Licensing Machine Learning Company Culture Software as a Service Remote Computing Printing Migration Development MSP Permission Lenovo Fraud Utility Computing Disaster Office Tips Electronic Health Records Database Bluetooth Downloads Automobile Authorization Address Augmented Reality Dark Web Screen Reader Software Tips Consulting Notes Heating/Cooling Unified Threat Management Emoji Operations Managing Stress WiFi VoIP Technology Tips IT Solutions Wireless Technology Processors 5G Options Cyber Monday Mobile Computing Apple OneNote Financial Time Management Disaster Resistance Tech Support Language eWaste Conferencing Shared resources Chatbots Cables Test Superfish Legal IBM Law Enforcement Cybercrime Cyberattacks Voice over Internet Protocol Multi-Factor Security USB Safety YouTube Personal Information Data Warehousing Smart Tech Managed Services Provider Unsupported Software PowerPoint Servers User Error Hacker Private Cloud Wearable Technology Enterprise Content Management GPS OneDrive Mouse Wireless Internet Google Maps Employee-Employer Relationship 3D Printing Procurement Proactive IT Update Computing Infrastructure Display Meetings Identity Supercomputer Gadget Cost Management Travel Dark Data Read Only Windows 7 Hacking Google Calendar Tracking Wires Social Engineering Zero-Day Threat Virus Microsoft Excel Connectivity Content Filtering History Point of Sale Mobile Data Professional Services Printer Vulnerabilities Instant Messaging Manufacturing Comparison Employer/Employee Relationships Distributed Denial of Service Modem Security Cameras Touchscreen IT Consulting Alerts Enterprise Resource Planning Corporate Profile Black Market IT Budget WPA3 Operating System Hard Drive Solid State Drive Transportation Trending Legislation Geography Digital Search Backup and Disaster Recovery Computer Repair Crowdsourcing G Suite Cabling E-Commerce Virtual Assistant Websites IT Technicians Finance Hard Disk Drives Specifications Notifications Proactive Maintenance Managed IT Service Cookies Remote Worker Data Breach Botnet Mobile Computer Care WannaCry Physical Security Social Networking Fleet Tracking Tech Terms Google Drive Sports Spam Cache Taxes Hard Disk Drive Network Congestion Bookmarks Mirgation High-Speed Internet Spyware Human Error Firefox Permissions Star Wars Humor Features Wasting Time Statistics SharePoint Business Growth End of Support Authentication Mail Merge Break Fix Nanotechnology Cortana Monitoring ROI Technology Laws Staff Solid State Drives Black Friday Motherboard Asset Tracking Theft Avoiding Downtime Techology Telephony Hotspot Recycling Favorites Education Teamwork Shortcut CrashOverride Lithium-ion battery GDPR Mobile Device Managment Relocation Administrator Hiring/Firing Fun Marketing Budget Information Technology Competition IP Address Error Cleaning Hard Drives Motion Sickness Printers Emergency Mobile Office Public Cloud Domains Students Regulation Public Speaking Hacks Database Management Sync Staffing Presentation IT Consultant