Network Synergy Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Cloud Infrastructure Value Best Available Tech Support Smart Technology Mobility Halloween End of Support Human Error LinkedIn Personal Information Document Management VoIP Mail Merge Wearable Technology Website GPS Cameras Public Speaking Marketing Automobile Gadget Dark Web Travel Cyber Monday Virus Internet Exlporer Passwords Business Owner Work Station Online Currency Webinar Network How To Private Cloud Notifications RMM Law Enforcement Bitcoin Emoji Smartphones Mobile Computing Writing Wireless Technology Net Neutrality Debate Inbound Marketing Migration Education Digital Payment Corporate Profile Cost Management Data Breach Technology Laws Computer Accessories Language LiFi Tip of the Work Nanotechnology Windows 8 Alt Codes Twitter Programming Trending Motherboard Congratulations Help Desk Applications Superfish Wi-Fi Law Firm IT Smartphone Machine Learning Company Culture Mobile Security G Suite Processors Productivity Work/Life Balance Apple Distributed Denial of Service Taxes Windows 10 Saving Money Text Messaging Firefox Competition Chatbots Training IT Services Unified Threat Management High-Speed Internet Instant Messaging Deep Learning IT Consultant Managed IT Services Files User Error Display Monitors Identities Enterprise Content Management Relocation Trainging Business Technology Mirgation PDF Google Robot Content Filtering Star Wars Remote Support Security Google Calendar Downloads Samsung Hosted Solution Hacker Consulting Motion sickness Holiday Print Server Specifications Workplace Tips User Tips Computing Infrastructure Unified Communications Spam Innovation Windows 8.1 Update Service-based Business Meetings Co-managed IT Network Security Facebook People Best Practices Apps Computers Hardware Password Laptop MSP Backup and Disaster Recovery Customer Service Wireless Business Continuity Business Computing Finance Cabling Budget Fun Data Backup Redundancy Two-factor Authentication Bandwidth Digital Public Cloud Fax Server Healthcare Proactive IT Assessment Chromebook Employee-Employer Relationship Memory File Sharing Video Surveillance Word Humor Websites IT service OneNote Buisness Windows 10 Small Business Modem Google Analytics 3D Printing Operations Favorites Tutorials YouTube Government Conferencing Authentication Proactive Chrome Politics Tech Term Router Upgrade Managed IT Communication Scary Stories Staffing Vendor Management Social IoT Regulation Cooperation Data Loss Sync Error IT Support Solid State Drive Remote Monitoring and Management Vulnerabilities Multi-Factor Security Entrepreneur Virtual Desktop Permissions Documents Outsourced IT Web Server Social Engineering Lenovo Safety Typing Comparison Telephony Risk Management Managed IT services IT Consulting CIO Smart Tech Hotspot Productivity Information Technology Saving Time Managed Services Provider Upgrades Technology communications SaaS SharePoint Remote Workers Paperless Office Computing Money Software Tips Financial Connectivity Botnet Macro Ransomware Scam Bluetooth Save Time Vulnerability IT Technicians Analyitcs Administrator Software Printing Telephone Systems Cables Electronic Medical Records Employees Mobile Office Tips Test Customer Relationship Management Business Intelligence Server Management Theft Legal Environment Tip of the Week 3D Zero-Day Threat Alerts Running Cable Mobile Device Management Black Market Physical Security Consumers Authorization Shortcut Maintenance Mobile Devices Windows Wires Webcam Recovery Battery Phishing Hard Disk Drive Operating System Internet of Things Hackers Automation Server Business Management Asset Tracking Domains Current Events Microsoft Logs E-Commerce IT Solutions Google Maps Experience eBay Mobile Office Microsoft Office Cloud Computing Mobile Technology Unsupported Software Project Management Heating/Cooling Managing Stress Backups Hiring/Firing CrashOverride Cookies Troubleshooting 5G Data Management Cortana Thank You Managed Service Provider Augmented Reality Data Security Regulations Fleet Tracking Crowdfunding Break Fix Settings Cryptocurrency Streaming Media Start Menu WPA3 Monitoring Statistics Information Techology Flexibility USB Piracy Recycling Development Cybercrime IBM Virtual Reality Utility Computing Microsoft Excel Downtime Managed IT Service App The Internet of Things iPhone Avoiding Downtime Computer Care Procurement Bookmarks Bring Your Own Device Health Application IT Support CCTV Collaboration Secruity Antivirus Tracking Gaming Console IT budget Knowledge Features Patch Management Artificial Intelligence Android Excel Data Virtual Private Network Quick Tips Skype Uninterrupted Power Supply History Phone System Electronic Health Records Black Friday Retail Drones Business Growth Technology Tips Tip of the week WiFi Hosted Solutions Cache Computer Identity How To Miscellaneous Point of Sale Search Leadership Intranet Users Geography Data Recovery BYOD Managed Service Access Control Sports Privacy Disaster Resistance Going Green IP Address Networking Unified Threat Management PowerPoint Email HIPAA Digital Signature Mobile Device Cyberattacks Hacking Disaster Recovery Efficiency Refrigeration Google Docs Network Management Mobile Data Lithium-ion Battery Encryption Administration Virtualization Backup Legislation Outlook Cleaning Management Blockchain Disaster Time Management Office Gadgets Big Data Hard Drives PC Care Presentation Scheduling Enterprise Resource Planning Charger Identity Theft Firewall Tech Terms Social Networking Crowdsourcing eWaste Malware Food Data Warehousing Computer Repair Alert Best Practice Tablet Servers Office 365 IT Management Hard Drive Gmail Mouse Printer User Business Permission Data storage Screen Reader Software as a Service Hacks Google Wallet Save Money Storage Read Only Social Media Internet Remote Computing BDR Network Congestion Cybersecurity Staff Google Drive Browser Supercomputer Licensing Printers Employer-Employee Relationship Fraud Undo Consultation Address Spyware Compliance Touchscreen Remote Monitoring VPN

      Latest Blogs

      As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. W...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube