312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 19 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Productivity Hackers Network Security Software Hosted Solutions Outsourced IT IT Services Data Backup Data Productivity Managed IT Services Internet Tech Term Business Computer Ransomware Innovation Data Recovery Microsoft Cloud Computing Small Business IT Support Backup Hardware Mobile Devices Business Continuity IT Support Google Paperless Office User Tips Efficiency Remote Monitoring Smartphone Android Business Management Internet of Things Data Management VoIP Managed IT Communication Managed IT Services Disaster Recovery Browser Collaboration Smartphones Managed Service Provider Encryption Cybersecurity Mobile Device Passwords Holiday Phishing Artificial Intelligence Save Money Office 365 Workplace Tips Social Media Windows 10 Windows 10 BYOD Wi-Fi Employer-Employee Relationship Server Government Document Management Upgrade Applications Facebook Telephone Systems Bandwidth Unified Threat Management BDR Compliance Antivirus Recovery Healthcare Network Vendor Management Vulnerability IT Management Scam Risk Management Project Management Communications Saving Money SaaS Information Infrastructure Tip of the week Gmail Tablet Two-factor Authentication File Sharing App Automation Password Virtualization Apps Files Help Desk Going Green Maintenance Microsoft Office Money Router Word Regulations Data Storage Customer Relationship Management Politics Website Quick Tips Virtual Reality Chrome Blockchain Work/Life Balance Bring Your Own Device IT Service Windows Hosted Solution Wireless Managed Service Office Data Security Mobile Device Management Training Robot Firewall Data loss Storage Software as a Service Computing Assessment Alert How To Patch Management Uninterrupted Power Supply Mobility How To Monitors Samsung Unified Communications The Internet of Things Redundancy Management Smart Technology Network Management Chromebook Employees Server Management HIPAA Big Data Analytics Twitter Flexibility VPN Remote Monitoring and Management Health Miscellaneous Machine Learning Customer Service Social Internet Exlporer Access Control Remote Computing Remote Workers IoT Printing Electronic Medical Records Virtual Private Network Mobile Security Outlook Digital Payment Upgrades Identity Theft Computers Business Technology Company Culture Licensing Features Hotspot Wasting Time Recycling Unsupported Software Shortcut Private Cloud Black Friday Human Error Motherboard Avoiding Downtime Techology Personal Information 3D Printing Bluetooth Downloads Update Authentication Migration Development Display Lenovo Monitoring Fraud ROI Utility Computing Disaster Heating/Cooling Unified Threat Management Gadget Favorites Operations Managing Stress WiFi VoIP Dark Data Augmented Reality Address Asset Tracking Dark Web Theft Screen Reader Software Tips Electronic Health Records Language eWaste Mobile Data Wireless Technology Technology Tips MSP Cyber Monday Permission Mobile Computing Apple Social Engineering Tech Support Time Management Disaster Resistance Virus Safety Multi-Factor Security Authorization Chatbots Cables IBM Consultation Superfish Consulting Notes Hacker Servers User Error Conferencing Wearable Technology Enterprise Content Management GPS YouTube Black Market OneNote Data Warehousing Financial Smart Tech Cyberattacks Computing Infrastructure Mouse Proactive Test Google Maps Search Gadgets Proactive IT Computer Repair Crowdsourcing Travel Hacking Google Calendar Botnet Identity Supercomputer Notifications Managed Services Provider Net Neutrality PowerPoint Cost Management Printer Sports Meetings Vulnerabilities Tracking Settings Network Congestion Physical Security Employee-Employer Relationship Microsoft Excel Procurement Connectivity Content Filtering History Read Only Alerts Enterprise Resource Planning Corporate Profile Humor Comparison Business Growth Distributed Denial of Service RMM Modem Users Touchscreen IT Consulting Solid State Drive Cortana Trending Legislation Wires Zero-Day Threat IT Budget End of Support Networking Point of Sale Professional Services Hard Drive Websites Telephony Instant Messaging IT Technicians Geography Digital Education Security Cameras G Suite Cabling Cooperation Mobile Computer Care WannaCry Office Tips Specifications Automobile WPA3 Managed IT Service Operating System Cookies Downtime Data Breach Virtual Assistant Cache Taxes Hard Disk Drive Emoji Backup and Disaster Recovery Social Networking Spam Google Drive E-Commerce Statistics SharePoint Finance Mirgation High-Speed Internet Spyware Firefox IT Solutions Processors Permissions Remote Worker Star Wars Legal Law Enforcement Bookmarks Staff Mail Merge USB Fleet Tracking Break Fix Tech Terms Nanotechnology Technology Laws IT Consultant Presentation Regulation Fun Lithium-ion battery CrashOverride Mobile Device Managment 5G Error Administrator Cybercrime Hard Drives Marketing Information Technology Public Cloud Budget Competition IP Address Cleaning Motion Sickness Hacks Mobile Office Emergency Printers Domains Relocation Hiring/Firing Staffing Public Speaking Sync