Network Synergy Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, December 15, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Lenovo IT Consultant Malware Data Security Printer Hardware Motherboard Firewall Internet Cache Mobile Devices Ransomware Flexibility Workplace Tips Legislation Smartphones Money Business Computing Bluetooth Managed IT Service Battery Computer Accessories Fleet Tracking BYOD Connectivity Communication eWaste Finance Office 365 People Social Networking Google Docs Business Cloud Computing Operations CIO Cameras Vendor Management Mobile Computing Language Permissions Technology Tips Monitoring Google Drive Managed IT Services Facebook Regulation Buisness Hosted Solution IT budget Telephone Systems Management Law Enforcement Backup Save Money Encryption Procurement Going Green Productivity Computer Best Available Bring Your Own Device Sports Conferencing Statistics Storage Black Friday Windows Tracking Security Phishing Analyitcs Favorites IP Address Meetings User Error Wireless Technology Web Server Politics Avoiding Downtime iPhone Tech Support Presentation Public Cloud Proactive Business Owner Patch Management Data Loss Android Word Paperless Office Digital Signature Shortcut Debate Congratulations Assessment Sync Identities Botnet Mobile Spyware Google Analytics Cortana Two-factor Authentication Smart Tech Black Market Corporate Profile Data Warehousing Business Management User Identity Unified Threat Management Computers Outlook Automobile Deep Learning Intranet E-Commerce Mobile Technology Firefox Files Recycling Gmail User Tips Information App Managed Service Provider Theft Competition Server Net Neutrality Mirgation Access Control Test Project Management Skype Google Maps Network Computer Repair Business Growth Hacks Licensing Public Speaking Best Practices Hosted Solutions Servers Google Calendar Co-managed IT Training Remote Monitoring and Management Scheduling Password Applications Remote Support Halloween Cost Management Hard Disk Drive Software Tips Big Data Disaster Recovery Wires Technology Laws Chromebook IT Support Managed IT services Gadgets Proactive IT Cybercrime Wearable Technology Upgrade Identity Theft File Sharing communications Laptop Tech Terms Managed IT USB Fraud Electronic Health Records Printers Consumers Customer Service Trending Social Media Network Management Managed Services Provider Save Time Saving Time Value Fax Server Data Backup Start Menu Personal Information Education End of Support Downloads IT service Video Surveillance Mail Merge Maintenance Vulnerabilities Antivirus Virtual Private Network Office Tips Hiring/Firing Technology Mobile Office Data Recovery Staff Office Bitcoin Productivity Wi-Fi Tip of the week Privacy Nanotechnology Windows 10 IT Management Computer Care Travel Business Technology History IT Services Read Only Cyberattacks IT Solutions Information Technology Operating System Redundancy Inbound Marketing Router VoIP Logs Undo Regulations Cybersecurity Leadership Asset Tracking Work Station Mobility Network Congestion Legal Browser Software as a Service Virtual Reality CrashOverride Virtualization Address IT Technicians IoT Uninterrupted Power Supply Piracy Taxes Automation Recovery Microsoft Excel Twitter Wireless Mobile Security Hacker Google Work/Life Balance Application Outsourced IT Artificial Intelligence 3D Printing Food Windows 8 Domains Backup and Disaster Recovery Staffing Crowdsourcing Distributed Denial of Service Solid State Drive Blockchain Hard Drives Scam Smartphone Consultation YouTube Monitors Apps Lithium-ion Battery Migration Online Currency Programming Touchscreen Knowledge Vulnerability Best Practice Internet Exlporer Specifications Error Features Small Business Tutorials Infrastructure HIPAA Notifications Business Continuity Writing Enterprise Content Management PC Care Development Employer-Employee Relationship Charger Mobile Device Management Samsung G Suite Smart Technology Downtime Website Computing Infrastructure Machine Learning Current Events Law Firm IT Miscellaneous Government The Internet of Things Compliance Hackers Social Engineering Safety Virus Point of Sale Disaster Resistance Enterprise Resource Planning How To Employee-Employer Relationship Drones IT Consulting Dark Web LiFi Printing eBay Webinar Cookies Cooperation Passwords Health Apple Environment Network Security Tech Term SaaS Macro Modem Bookmarks Windows 8.1 Update Comparison Private Cloud Display Break Fix Data storage Content Filtering Email Cabling Streaming Media Mobile Data Microsoft PDF Remote Monitoring MSP Customer Relationship Management LinkedIn Retail Google Wallet Excel Permission Zero-Day Threat Data Management Efficiency Help Desk Unified Threat Management Secruity Data Breach Search Experience Human Error Webcam Refrigeration Chrome Relocation Hacking Administration Employees Tablet Digital Mouse Motion sickness Service-based Business Disaster Spam Telephony CCTV Augmented Reality BDR Tip of the Week IT Support Screen Reader Cables Unsupported Software Websites Virtual Desktop Utility Computing Cloud Innovation Troubleshooting WPA3 Robot Social Heating/Cooling Techology Alerts Tip of the Work Authorization Marketing Quick Tips Backups Text Messaging Remote Computing Hotspot Fun Instant Messaging Trainging Print Server Collaboration Crowdfunding Users Bandwidth Remote Workers Digital Payment Windows 10 Alert Settings Gaming Console Saving Money Managing Stress Managed Service Healthcare Administrator How To Processors IBM Mobile Device Consulting Superfish PowerPoint Emoji Scary Stories Thank You Unified Communications Geography Alt Codes Business Intelligence Microsoft Office Multi-Factor Security Typing Holiday 5G Memory Running Cable RMM Company Culture WiFi Hard Drive Humor GPS Document Management Financial Entrepreneur Software Server Management Chatbots OneNote Gadget Time Management Authentication Budget Upgrades Cyber Monday Phone System SharePoint Star Wars Data Networking High-Speed Internet Supercomputer 3D Cleaning Cryptocurrency Computing VPN Internet of Things Risk Management Electronic Medical Records Physical Security Documents

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube