301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Productivity Malware Hackers Email Business Software Network Security Hosted Solutions Tech Term Internet Computer Data Mobile Devices Data Backup User Tips Ransomware Backup Google Efficiency IT Support Managed IT Services Data Recovery Innovation Microsoft Cloud Computing Hardware Small Business Productivity Outsourced IT IT Services Business Management Smartphone Paperless Office Managed Service Provider Office 365 Social Media Collaboration Android Business Continuity Workplace Tips Encryption Save Money Smartphones Remote Monitoring Windows 10 Windows 10 Communication Browser Data Management Managed IT Services Government Employer-Employee Relationship Holiday Phishing Server Disaster Recovery Bandwidth Information Cybersecurity App Upgrade BYOD Healthcare Artificial Intelligence VoIP Work/Life Balance Wi-Fi Facebook Passwords Unified Threat Management Infrastructure Tip of the week Apps Document Management Antivirus Communications Scam BDR Vulnerability Internet of Things IT Management Mobile Device Managed Service Compliance Blockchain Hosted Solution Maintenance Saving Money Office Quick Tips Password Word Money Chrome Chromebook Politics Two-factor Authentication Virtual Reality Automation Risk Management File Sharing How To Applications Vendor Management SaaS Customer Relationship Management Windows Big Data Network Computing How To Machine Learning Website VPN Identity Theft Point of Sale Gmail Robot Data Security Telephone Systems Business Technology Regulations Server Management IoT Recovery Virtual Private Network G Suite Wireless Storage Social Professional Services Mobile Device Management Remote Computing Firewall Private Cloud Computer Care Management Taxes Downtime Access Control HIPAA Training Mobile Security Websites Tech Support Bring Your Own Device Patch Management Alert Meetings Hacker Remote Monitoring and Management Smart Technology Health Employees Botnet Microsoft Office Tablet Data loss Samsung Remote Workers Company Culture Physical Security Twitter Automobile Router Electronic Medical Records Language Internet Exlporer Zero-Day Threat Education Comparison Personal Information Utility Computing Features Uninterrupted Power Supply Servers Users Connectivity Update Software as a Service Geography Instant Messaging YouTube Gadget Multi-Factor Security Mirgation Network Management Customer Service Remote Worker Managing Stress Help Desk Managed IT User Error Fleet Tracking Operating System WiFi Managed IT Service Modem Legal Travel Computing Infrastructure Value Backup and Disaster Recovery Analytics Relocation Cleaning Specifications Electronic Health Records Permissions Wasting Time High-Speed Internet Finance Settings Google Calendar Notifications Monitoring IT Support Touchscreen Spam Supercomputer Sports ROI Enterprise Content Management Bookmarks Corporate Profile Outlook Printer Wearable Technology IT Solutions Asset Tracking Tech Terms Google Drive GPS Break Fix Cookies Solid State Drive Statistics Motion Sickness Alerts Virtualization MSP Human Error Lenovo Black Friday Social Networking Computer Repair Financial Cyberattacks Fraud Star Wars Development Authentication Digital Mail Merge Legislation Chatbots USB Consulting Cabling IT Budget Search Notes Unified Communications Favorites WannaCry Shortcut Web Server Upgrades Processors OneNote Theft VoIP Office Tips Techology Tracking Dark Web Nanotechnology Procurement Enterprise Resource Planning Files Hard Disk Drive Bluetooth Licensing Proactive Permission Firefox Error Superfish Augmented Reality Cyber Monday Motherboard Cost Management Cables Authorization Spyware Address IT Consultant Mouse Identity Dongle Managed Services Provider Digital Payment PowerPoint Project Management Monitors Cameras SharePoint Employee-Employer Relationship Avoiding Downtime IBM Microsoft Excel Screen Reader Security Cameras Mobile Read Only Cooperation Cortana Black Market Test The Internet of Things Staffing Hotspot Assessment Emoji Wires Crowdsourcing Service Level Agreement E-Commerce Disaster Heating/Cooling Gadgets Cybercrime Budget Smart Tech Virtual Assistant Vulnerabilities Conferencing Law Enforcement CCTV Downloads IT Technicians Time Management Administrator Printing Webcam Unified Threat Management Staff WPA3 RMM Networking Distributed Denial of Service Hiring/Firing Emergency Miscellaneous Mobile Office Fun Regulation Domains Public Speaking Hard Drives Presentation Lithium-ion battery Wireless Technology 5G Safety Marketing CrashOverride Competition Printers IP Address