301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Email Hackers Business Network Security Tech Term Software Internet Productivity Hosted Solutions Computer Backup Mobile Devices Managed IT Services User Tips IT Support Microsoft Data Ransomware Data Backup Data Recovery Productivity Google Efficiency Managed Service Provider IT Services Smartphone Workplace Tips Encryption Cloud Computing Outsourced IT Android Innovation Business Continuity Social Media Hardware Windows 10 Data Management Communication Small Business Business Management Browser Paperless Office Office 365 Disaster Recovery Government Save Money Remote Monitoring Collaboration Facebook Infrastructure Tip of the week Smartphones Server Unified Threat Management Phishing Bandwidth Cybersecurity App BYOD Artificial Intelligence Windows 10 Work/Life Balance Politics Chromebook Saving Money Virtual Reality Risk Management File Sharing Antivirus How To Document Management VoIP Two-factor Authentication Vulnerability Wi-Fi Applications Managed IT Services SaaS IT Management Windows Passwords Network BDR Mobile Device Hosted Solution Apps Internet of Things Word Office Managed Service Password Compliance Employer-Employee Relationship Holiday Customer Relationship Management Healthcare Chrome Big Data Money Taxes Storage IoT Training Automation Websites Patch Management HIPAA Vendor Management Scam Alert Health Meetings Botnet Data loss Mobile Security Samsung Automobile Smart Technology How To Physical Security Twitter Tech Support Remote Workers Machine Learning VPN Computing Maintenance Identity Theft Quick Tips Data Security Point of Sale Server Management Hacker Router Business Technology Robot Information Virtual Private Network Telephone Systems G Suite Recovery Blockchain Gmail Remote Computing Computer Care Regulations Website Firewall Asset Tracking Google Calendar WannaCry Shortcut Enterprise Content Management Bookmarks Downtime Permissions IT Budget VoIP Techology MSP Printer Web Server Wearable Technology Hard Disk Drive Bluetooth Search Management Cyberattacks Office Tips Break Fix Tracking Cookies Firefox Superfish Upgrade Upgrades Processors USB Consulting Error Black Friday Social Networking Spyware Address Development Alerts Spam OneNote Legislation IT Consultant Chatbots Monitors Wireless Unified Communications Favorites Fraud Digital Payment Star Wars Avoiding Downtime Proactive Access Control Cameras Mobile Device Management Enterprise Resource Planning Files Dark Web Nanotechnology Disaster Heating/Cooling Dongle Managed Services Provider Communications Cyber Monday Staffing Motherboard Cortana Black Market Cables Licensing Crowdsourcing Employee-Employer Relationship Mouse Identity Emoji Bring Your Own Device Project Management Cybercrime Cost Management Time Management Remote Monitoring and Management Law Enforcement SharePoint CCTV Mobile Read Only Administrator Microsoft Excel Screen Reader Networking Uninterrupted Power Supply Servers Electronic Medical Records Service Level Agreement E-Commerce Augmented Reality Wires Webcam Cooperation Network Management Personal Information Tablet Education YouTube Vulnerabilities Conferencing Hotspot Assessment WPA3 Gadget Downloads IT Technicians Managed IT Update Company Culture Smart Tech IBM Staff Legal Utility Computing Features Distributed Denial of Service WiFi Analytics The Internet of Things Unified Threat Management IT Support Touchscreen Gadgets Budget Relocation Comparison Cleaning Settings Microsoft Office Geography Instant Messaging Travel Language Internet Exlporer Social Notifications Fleet Tracking Multi-Factor Security Mirgation Corporate Profile Outlook Managing Stress Help Desk Supercomputer Connectivity Google Drive User Error Solid State Drive Statistics Sports Electronic Health Records Managed IT Service GPS Modem Lenovo IT Solutions Cabling Computer Repair Professional Services Monitoring Private Cloud Specifications Digital Mail Merge Virtualization High-Speed Internet Motion Sickness Computing Infrastructure Value Customer Service Miscellaneous Hard Drives Mobile Office Domains CrashOverride Public Speaking Presentation Lithium-ion battery Emergency Wireless Technology 5G Hiring/Firing Safety Printers Marketing Fun Competition IP Address Regulation Users Finance