301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Email Network Security Software Business Productivity Tech Term Internet Hosted Solutions Computer Data Data Backup Backup Managed IT Services Mobile Devices Microsoft IT Support Ransomware User Tips Data Recovery Productivity Google Efficiency Managed Service Provider IT Services Innovation Smartphone Outsourced IT Android Social Media Encryption Cloud Computing Business Continuity Hardware Workplace Tips Communication Business Management Small Business Collaboration Paperless Office Browser Office 365 Remote Monitoring Windows 10 Data Management Disaster Recovery Save Money Windows 10 Bandwidth Government Managed IT Services Smartphones Server Cybersecurity App BDR Infrastructure Tip of the week Antivirus Healthcare Vulnerability Phishing BYOD IT Management Unified Threat Management Work/Life Balance Facebook Artificial Intelligence Wi-Fi Risk Management Chrome Mobile Device How To Passwords Applications Apps Holiday SaaS Internet of Things Managed Service Customer Relationship Management Scam Information Compliance Hosted Solution Big Data Politics Blockchain Office Password Employer-Employee Relationship Upgrade Saving Money File Sharing Document Management Maintenance Money Chromebook Word Virtual Reality VoIP Windows Two-factor Authentication Network Machine Learning Mobile Security Remote Monitoring and Management Identity Theft Alert Point of Sale Health Tech Support Smart Technology Remote Workers Telephone Systems Samsung G Suite Hacker Patch Management Electronic Medical Records Physical Security Twitter Router Vendor Management Computer Care Computing Firewall Taxes Downtime Data loss Robot Website Training Gmail Regulations Websites How To Recovery VPN IoT Storage Remote Computing Meetings Communications Quick Tips Data Security Wireless Botnet Business Technology Mobile Device Management Server Management Virtual Private Network Automobile HIPAA Automation Cyber Monday Motherboard Bring Your Own Device Project Management Education Lenovo Licensing Employee-Employer Relationship Solid State Drive Statistics Mobile Read Only Gadget Digital Mail Merge Cost Management Test Cabling Financial Mouse Identity Augmented Reality WannaCry Shortcut Microsoft Excel Screen Reader Wires Employees VoIP WiFi Techology SharePoint Cortana Black Market Service Level Agreement E-Commerce Crowdsourcing IBM Vulnerabilities Conferencing Relocation Firefox Cleaning Superfish Cooperation Emoji Hard Disk Drive Travel Bluetooth The Internet of Things Company Culture Spyware Address Hotspot Assessment WPA3 RMM Supercomputer Tablet Monitors Gadgets Smart Tech Budget Zero-Day Threat Avoiding Downtime GPS Downloads IT Technicians Microsoft Office Utility Computing Features Distributed Denial of Service Personal Information Geography Instant Messaging Private Cloud Unified Threat Management Staff Motion Sickness Comparison Managing Stress Help Desk Language Update Internet Exlporer Fleet Tracking Operating System Disaster Heating/Cooling IT Budget Electronic Health Records Web Server Legal Users Connectivity Backup and Disaster Recovery Office Tips Time Management Tracking Multi-Factor Security Mirgation Managed IT Service Modem Customer Service High-Speed Internet Finance Error Networking User Error Professional Services Monitoring Specifications Social Notifications Enterprise Content Management Bookmarks IT Consultant Computing Infrastructure Value Asset Tracking Tech Terms Uninterrupted Power Supply Servers Digital Payment Management Cyberattacks YouTube Cameras Permissions Sports MSP Human Error Network Management Google Calendar IT Solutions Managed IT Break Fix Computer Repair Cookies Spam Development Authentication Staffing Printer Virtualization Wearable Technology USB Consulting Black Friday Social Networking Unified Communications Favorites Analytics Alerts OneNote Theft Cybercrime Enterprise Resource Planning Files Law Enforcement Settings CCTV Search Fraud Star Wars Proactive Permission IT Support Administrator Touchscreen Legislation Upgrades Chatbots Processors Corporate Profile Webcam Outlook Dark Web Nanotechnology Cables Authorization Google Drive Access Control Dongle Managed Services Provider Lithium-ion battery Wireless Technology 5G Safety Printers Marketing Procurement Hiring/Firing Competition CrashOverride IP Address Fun Regulation Miscellaneous Emergency Mobile Office Domains Hard Drives Public Speaking Presentation