Network Synergy Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Twitter Processors Assessment Consumers Connectivity History Alerts Big Data Data Breach Computers Settings Electronic Medical Records IT budget Artificial Intelligence Bring Your Own Device Content Filtering Remote Monitoring Regulations Saving Money Paperless Office Language Windows 8 App Relocation Mobile Office Mobile Device Managing Stress Regulation Websites Mail Merge Company Culture Crowdsourcing Nanotechnology Internet Exlporer Modem CCTV Troubleshooting Data Warehousing Efficiency Spyware Online Currency Personal Information Alt Codes File Sharing Smart Technology Mobile Data Gadget SharePoint Email Customer Relationship Management Productivity Management Disaster Recovery Mobile Technology Law Firm IT Cybersecurity Managed Service Sports Social Unified Communications Mobility Lithium-ion Battery Taxes Electronic Health Records Tech Support Print Server Business Continuity Gaming Console Business Business Computing Hiring/Firing Web Server Cabling Start Menu Hard Drive Small Business Data Management Software as a Service User Error Smartphones Hardware GPS Cloud Managed IT Service Managed IT Services Healthcare Dark Web Internet of Things Backup Google Maps Software Tips PowerPoint Experience Apple Remote Computing Hosted Solutions PDF Travel Programming eBay Fraud Display Value Business Management Computer Administration Users User Tips Blockchain Save Money Mirgation Wearable Technology Money Best Practices Utility Computing Hacking LiFi Flexibility Private Cloud SaaS Permissions Competition Drones Google Calendar Licensing Streaming Media Undo Asset Tracking 3D Antivirus Hackers Data storage Outsourced IT Food Google Drive Gmail Telephony Technology Laws Internet Fleet Tracking Motherboard Microsoft Office Going Green Disaster Resistance PC Care Health IT Support Windows 10 YouTube WiFi Bluetooth Current Events Knowledge Information Sync Files CrashOverride Geography Storage Excel Word Crowdfunding Mobile Devices Unified Threat Management Business Technology IBM Typing Workplace Tips Monitoring Macro Avoiding Downtime Hacker Notifications Net Neutrality Fax Server Innovation Downtime Upgrade Work Station Digital Payment Webinar Automobile Touchscreen Google Domains Managed Services Provider Business Growth Work/Life Balance Disaster G Suite Education Tip of the Week Wi-Fi Social Engineering Business Owner Conferencing Monitors Malware Tip of the Work Google Wallet Entrepreneur Search Cookies Motion sickness Business Intelligence Infrastructure Information Technology Virtual Private Network IT Consultant Address IT service Screen Reader Technology Black Market Piracy Mobile Computing Congratulations Upgrades IT Services IT Support Charger Employer-Employee Relationship Holiday Tracking Virtualization Telephone Systems Features Intranet Trending Office Tips Techology IT Consulting End of Support Managed IT services Miscellaneous Digital Scary Stories Meetings Co-managed IT Security Finance LinkedIn Vendor Management Environment Social Media Law Enforcement Network Congestion Black Friday Chromebook Customer Service Memory iPhone Communication Outlook Data Downloads Debate Lenovo Wireless Technology Applications Superfish Collaboration Humor Comparison How To The Internet of Things Backups Documents Google Analytics Save Time Consulting BDR Tablet Technology Tips IT Technicians Two-factor Authentication Android Bandwidth Error Tip of the week Unsupported Software Productivity Politics Physical Security Office 365 Browser E-Commerce Skype Virus Privacy Printing 3D Printing Managed IT Windows 8.1 Update Bookmarks Recycling communications Network Security Logs Hacks Multi-Factor Security Mobile Device Management Recovery Best Practice Hosted Solution WPA3 Proactive IT IP Address Fun HIPAA Migration Specifications Cost Management Website Server Management Inbound Marketing Heating/Cooling Deep Learning Laptop Retail Remote Workers Robot Uninterrupted Power Supply Government Machine Learning Thank You Point of Sale Redundancy Favorites Distributed Denial of Service Remote Monitoring and Management Service-based Business Writing How To USB IoT OneNote Digital Signature Proactive Enterprise Resource Planning Read Only Halloween Shortcut Bitcoin Mobile Security Text Messaging Tutorials Facebook Cables Marketing Data Loss Operating System Buisness Cybercrime Consultation Password High-Speed Internet Phishing Servers People Scam Secruity Cache Legislation Cloud Computing 5G Spam Office Identity Gadgets Cyberattacks Wireless Cryptocurrency Trainging Application Augmented Reality Identity Theft Statistics Vulnerability Time Management Supercomputer Passwords Saving Time Network Management Document Management Webcam Budget Training Vulnerabilities Cameras Video Surveillance Legal Solid State Drive Router Safety Public Speaking Access Control Public Cloud Tech Term Computing Risk Management Server Smartphone VPN Firewall CIO Microsoft Printers BYOD Printer Analyitcs Botnet Operations Employee-Employer Relationship IT Solutions Mobile Firefox Wires Google Docs Windows 10 Compliance Phone System Cleaning Cortana Running Cable Emoji Administrator Automation Hard Disk Drive Software IT Management Development MSP Unified Threat Management Help Desk Virtual Reality Cyber Monday Star Wars Encryption Presentation Data Security Smart Tech Computer Repair Corporate Profile Remote Support Managed Service Provider Ransomware Cooperation Chatbots Social Networking Data Backup Best Available Networking Virtual Desktop Identities Data Recovery Scheduling Battery Instant Messaging Enterprise Content Management Alert Maintenance eWaste Computer Care Samsung Break Fix Apps Project Management Computer Accessories Chrome Quick Tips User VoIP Mouse Microsoft Excel Network Hard Drives Staffing Computing Infrastructure Hotspot Patch Management Staff Windows Leadership Refrigeration

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube