Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 24, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Accountants Processors Social Network Tech Support Settings Managed IT Services Microsoft Excel managed services Windows 10 Retail Privacy Best Practice Drones Firewall Administration Comparison computer repair Emails Data storage Web Server Staten Island IT support Flexibility Startup Microchip In Internet of Things Applications Cybercrime Workers Cost Management Managed Service Provider Notifications Cloud Computing data recovery Staten Island Microsoft Innovation VPN Hackers Bitcoin malware Hard disk Mobile Security Communication Antivirus Phishing Social Business Computing Windows CCTV Spyware Education Password Compliance Network Congestion IT services NYC Cortana Managed IT Hacker Tech Terms Public Cloud IT consulting firm Distributed Denial of Service ransomware attacks Data Security Wireless datto Addiction Customer Resource management Browser Solid State Drive Business Technology Proactive IT data loss How To Trends malware worms Telephony YouTube BDR Cabling Physical Security Unified Threat Management SharePoint Vendor Virus IT Management Employer Employee Relationship Screen Reader IT consulting firms Windows 8 Laptop Vulnerability Taxes Google Maps Software License Training Efficiency IT support Staten Islans Cloud computing Staten Island Unified Communications Tablets Google Regulations Chromebook computer support Staten Island Managed IT Services Data Protection Powerful Technology Solutions Managing Stress Network Security Two-factor Authentication Recovery Printing Unified Threat Management Wi-Fi Websites Excel Twitter Machine Learning Monitoring Advertising Knowledge Conferencing Mobile Device Management Laptops Tip of the Week Hard Drive Disposal Paperless Office data recovery Business Metrics Database computer support Virtual Assistant Uninterrupted Power Supply Visible Light Communication Mobile Devices Google Wallet Sports Emergency HTML G Suite Business Cards Staten Island IT consulting it support Cybersecurity Congratulations Gamification Google Docs Politics Remote Computing Windows 10 Vendor Management Webcam Business Mangement Hardware Solutions Download IT support NYC Virtual Desktop File Sharing IBM Telephone Operating System Managed Service Business Management Access Computer Care Time Management Productivity BYOD Touchscreen eWaste Apps Disaster Recovery PDF Internet Music Audit Hardware Cache Devices Search Regulation Tracking Budget Security Error Equifax Google Calendar Writing Government managed services Staten Island Information Bandwidth Automation Social Media Scam Displays 3D Printing communications computer support firms Electronic Medical Records tech support Staten Isalnd Hard Drive Telephone Systems Lithium-ion battery managed IT services NYC IT services Staten Island Piracy Robot Update today ’s organizations Computer IT consulting NYC Windows XP Augmented Reality IT Support Device security Identity Theft Digital Payment Project Management Outlook Management Workplace Tips SaaS Bring Your Own Device Desktop tech support Software Samsung Specifications Data Breach CrashOverride Downloads VoIP User Tip computer services Staten Island Proxy Server Data Hiring/Firing Passwords Relocation Society Television Analytics Saving Money IT support Blockchain The Internet of Things Server Workstations Backup Safety Maintenance Monitors Smartphone Artificial Intelligence Word Help Desk Holiday Tablet Computing Infrastructure computer services Apple Information Technology Username Banking Running Cable Malware Office Tips Microsoft Office DDoS Staten Island tech support Tip of the week IT services New York City Social Engineering Email computer repair Staten Island IT consulting Meetings Upload Hosted Solution Flash IT Consultant Productivity Freedom of Information Computers email scam Remote Monitoring Start Menu Networking Documents Data Backup Network Management Facebook Android Scalability Disaster IT consulting company News Website Botnet Business Work/Life Balance managed IT services staten island History Document Management Travel managed it services Cryptocurrency Gadgets Content Legal Tech Term Health IT Bluetooth Printer Big Data Hacks Deep Learning Spam Lenovo Administrator Technology End of Support Business Growth Vendor Mangement Data Management Small Business IT consulting Staten island Company Culture Customer Service Virtualization Computer Malfunction Office end-user files Staffing Accidental deletion Access Control Mouse Fake News Law Enforcement Automobile computer support NYC IT support New York City Encryption Streaming Media Supercomputer tech support Staten Island Tactics Multi-factor Authentication Hacking Reliable Computing staten island managed services Staten Island computer support Smartphones Worker IT Services Quick Tips Service Level Agreement IT consulting Staten Island Internet of Things Black Market Experience Language Wireless Technology Wireless Headphones Google Drive User Tips Mobility Telephone System Miscellaneous Going Green Mobile Technology Thank You Software as a Service Securty Private Cloud Downtime Text Messaging LiFi Memory Collaboration Nanotechnology Computing IT support Staten Island Redundancy Legislation Network WiFi Corporate Profile Mobile Device Digital App Ransomware IT support firms Domains Content Filtering Employer-Employee Relationship Cleaning Business Continuity Hack Save Money Alert Printers Office 365 Money Multi-Factor Security Best Practices Backup and Disaster Recovery VoIP Gmail Vulnerabilities Hosted Solutions Patch Management Virtual Reality Motion Sickness Outsourced IT Cloud Health Rental Service CryptoLocker Upgrade

Newsletter Sign Up