Network Synergy Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Computer Repair Fraud The Internet of Things Writing LinkedIn Operating System Managed Service Point of Sale Crowdsourcing Cybersecurity Settings Tip of the Work Smartphone Bookmarks Internet Running Cable Law Enforcement People Server Google Hiring/Firing Staff Charger Undo Black Market iPhone Remote Monitoring and Management 3D Printing Augmented Reality Google Docs Printer Text Messaging Mobile Hacker Wireless Information Technology Laptop Mirgation Specifications GPS Managed IT services Business Intelligence Scam Employee-Employer Relationship Server Management Microsoft Hacking Files Flexibility Mobile Devices Service-based Business Break Fix Firewall Tip of the week Phishing Processors Collaboration Gadgets Modem Outsourced IT Twitter Privacy Holiday Social Wires Smartphones Blockchain Scary Stories Deep Learning Tracking Piracy Data Warehousing Windows 10 Facebook Remote Computing Administrator Google Wallet YouTube Work Station Tech Term PC Care Cost Management USB VoIP PowerPoint Ransomware Users Motion sickness Technology Tips Productivity Computing Infrastructure Legal Internet Exlporer Tablet LiFi Sync Downtime Password User Virtualization IT Services Money Migration Superfish Online Currency Proactive Mobile Data Thank You Recycling G Suite Computing IT Support Hacks Environment Spam Consultation Backup Fun Trainging Business Management Risk Management Browser Geography Google Drive Mobile Device Management Data Backup Managed IT Competition Taxes Bandwidth Network Security Monitors Debate Typing Documents Upgrades Cortana Features Avoiding Downtime Legislation Windows 8.1 Update Memory Personal Information Identity Remote Workers Marketing Mobile Device Productivity Cameras Uninterrupted Power Supply Health Budget Unified Threat Management Corporate Profile Domains Access Control Licensing Black Friday User Tips Downloads IT Consulting Proactive IT Macro Upgrade Law Firm IT Public Cloud Experience Politics Data Security Regulation Managed IT Services Chromebook Connectivity Software Tips End of Support Inbound Marketing Supercomputer Statistics Employer-Employee Relationship Cloud IP Address Chrome IT budget Save Time Word Computer Halloween Mail Merge Network Customer Relationship Management Digital Payment Office 365 Mobile Computing CrashOverride Analyitcs Healthcare Websites Virtual Private Network Video Surveillance IBM Screen Reader Battery Automobile Technology Laws Intranet Phone System How To Application Business Computing Hard Drive Disaster Recovery Smart Tech Net Neutrality Solid State Drive Best Practices Cooperation BDR Backups Scheduling Patch Management Identities Tutorials Innovation Alt Codes Enterprise Resource Planning Shortcut Data Breach OneNote Address Emoji Notifications Travel Website Web Server IoT Congratulations Language Social Engineering Data storage Windows Time Management Google Analytics Display Touchscreen Education Leadership Managed Service Provider Wireless Technology Information Retail History Computers Print Server Cybercrime Telephone Systems Vulnerability Bitcoin Bluetooth Tech Support Secruity Favorites User Error Excel Telephony Refrigeration Hackers Regulations Spyware Unified Threat Management Vulnerabilities Managing Stress Disaster Virtual Desktop Samsung Cyber Monday Encryption Mobile Office Chatbots Redundancy Quick Tips Artificial Intelligence Webinar Development Distributed Denial of Service Cleaning Firefox Big Data Sports Google Maps Cryptocurrency Finance Programming Botnet Google Calendar Office Content Filtering Heating/Cooling Smart Technology Business Gmail Apps Search Troubleshooting Administration Project Management Two-factor Authentication 3D Hardware Managed IT Service Hosted Solution Tip of the Week Alerts Lenovo Staffing Best Practice Crowdfunding Technology Virus Apple Remote Monitoring Software E-Commerce Presentation SaaS Assessment Saving Money Bring Your Own Device Windows 8 Mobile Security Work/Life Balance Miscellaneous Food Small Business eWaste Computer Accessories Office Tips Paperless Office Value Managed Services Provider Start Menu Skype Mobile Technology Robot Data Workplace Tips Digital Signature Social Media Cookies VPN File Sharing Gadget Fax Server Vendor Management Physical Security Internet of Things Wi-Fi BYOD Conferencing Data Management Techology Applications Hard Drives Enterprise Content Management Business Owner Compliance Going Green Business Growth Asset Tracking IT Technicians Communication Servers Entrepreneur WPA3 Identity Theft Consulting Data Recovery Virtual Reality Meetings Recovery Error eBay MSP Utility Computing Fleet Tracking IT service Help Desk Electronic Medical Records Save Money IT Management Star Wars Lithium-ion Battery Buisness Multi-Factor Security Co-managed IT Alert Management Cache Government Email Microsoft Office App Relocation Digital Software as a Service Cloud Computing Document Management Monitoring Network Congestion Unified Communications Outlook Social Networking HIPAA Mouse Instant Messaging Dark Web IT Support Printers Training Permissions Storage How To PDF Wearable Technology Trending Current Events Cabling Printing Android Hard Disk Drive Public Speaking SharePoint Customer Service Hosted Solutions Safety Comparison Company Culture Gaming Console Business Technology Antivirus Disaster Resistance Unsupported Software communications Remote Support Maintenance Cyberattacks IT Solutions Infrastructure Machine Learning Humor Business Continuity Security CIO Mobility High-Speed Internet Microsoft Excel Efficiency Operations 5G Motherboard Hotspot Electronic Health Records Knowledge Logs Computer Care Consumers Automation IT Consultant Best Available Drones CCTV WiFi Streaming Media Networking Private Cloud Cables Network Management Read Only Saving Time Windows 10 Webcam Data Loss Router Passwords Nanotechnology Malware

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube