312-253-4321    Get SUPPORT

Alchetec Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Malware Privacy Business Computing Email IT Services Hackers Network Security Outsourced IT Managed IT Services Software Productivity Data Backup Hosted Solutions Data Internet Tech Term Microsoft Ransomware Computer Productivity Data Recovery Backup Business IT Support Innovation Mobile Devices Cloud Computing Business Continuity Small Business IT Support Hardware Google Android User Tips Data Management Smartphone Managed Service Provider Paperless Office Communication Remote Monitoring Browser Disaster Recovery Internet of Things Managed IT VoIP Business Management BYOD Efficiency Workplace Tips Artificial Intelligence Cybersecurity Windows 10 Passwords Facebook Government Mobile Device Phishing Applications Office 365 Encryption Social Media Save Money Smartphones Wi-Fi Recovery Holiday Risk Management Project Management Collaboration Document Management Windows 10 Compliance Network Infrastructure SaaS Saving Money Server Tip of the week Telephone Systems Unified Threat Management Managed IT Services Two-factor Authentication Healthcare Antivirus Files Office Hosted Solution Help Desk Vulnerability Robot Money Router IT Management Word Storage Gmail Politics App Employer-Employee Relationship Customer Relationship Management Managed Service Chrome Virtual Reality IT Service Windows Virtualization Work/Life Balance Going Green Data Security Website Firewall Vendor Management Training Data Storage Regulations Data loss Bandwidth File Sharing Password BDR Mobility How To Samsung Unified Communications Uninterrupted Power Supply Bring Your Own Device Redundancy Outlook Computers Smart Technology Network Management Upgrades Maintenance Scam Chromebook Analytics Twitter Apps Server Management HIPAA VPN Remote Workers Health The Internet of Things Machine Learning Quick Tips How To Internet Exlporer Microsoft Office Remote Computing Blockchain IoT Big Data Monitors Virtual Private Network Information Digital Payment Mobile Security Identity Theft Business Technology Miscellaneous Upgrade Licensing Computing Tablet Assessment Alert Wireless Flexibility Automation Mobile Device Management Patch Management Chatbots Cables Proactive Consultation Superfish Cyberattacks Office Tips Multi-Factor Security GPS YouTube Black Market Data Warehousing Smart Tech Managed Services Provider Servers User Error Wearable Technology Enterprise Content Management Meetings Mouse Google Maps Employee-Employer Relationship Proactive IT Computer Repair Crowdsourcing Computing Infrastructure Management Augmented Reality Botnet Identity Supercomputer Tech Support Remote Monitoring and Management Notifications Net Neutrality Cost Management Travel Wireless Technology Read Only Hacking Google Calendar Vulnerabilities Tracking Settings IBM Wires Physical Security Microsoft Excel Connectivity Content Filtering History Safety Point of Sale Unsupported Software Printer Sports Display Comparison Business Growth Communications Distributed Denial of Service Modem Hacker Touchscreen 3D Printing IT Consulting Alerts Enterprise Resource Planning Corporate Profile IT Budget Gadgets WPA3 Networking Social Hard Drive Solid State Drive Dark Data Trending Legislation IT Technicians Geography Digital Social Engineering G Suite Cabling E-Commerce Websites Mobile Data Access Control Telephony Specifications Automobile Managed IT Service Cookies Data Breach Electronic Medical Records Cooperation Mobile Computer Care WannaCry Emoji Social Networking Fleet Tracking Google Drive Cache Taxes Hard Disk Drive Bookmarks Mirgation High-Speed Internet Spyware Customer Service Search Firefox IT Solutions Processors Permissions Star Wars Features Statistics SharePoint Mail Merge USB Break Fix Nanotechnology Monitoring Technology Laws Legal Law Enforcement Staff Company Culture Network Congestion Shortcut Software as a Service Black Friday Motherboard Asset Tracking Avoiding Downtime Techology Personal Information Hotspot Recycling Favorites Migration Development Spam MSP Lenovo Fraud Utility Computing Disaster Electronic Health Records Humor Bluetooth Downloads Update VoIP End of Support Address Dark Web Screen Reader Software Tips Consulting Cortana Heating/Cooling Unified Threat Management Gadget Operations Managing Stress WiFi Education Technology Tips Cyber Monday Mobile Computing Apple OneNote Time Management Printing Disaster Resistance Virus Language eWaste Conferencing Cybercrime Presentation Lithium-ion battery Public Cloud Hiring/Firing Information Technology 5G Fun Marketing Cleaning Budget Hacks Motion Sickness Printers Emergency Competition Downtime IP Address Relocation Users Hard Drives Regulation Sync Mobile Office Staffing Private Cloud IT Consultant Domains CrashOverride Mobile Device Managment Error Administrator Public Speaking