Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Accountants Securty Malware Help Desk Notifications Excel Small Business Word Tactics Technology Flash Mobile Devices IT support HTML Wireless Headphones Bluetooth Private Cloud Disaster Taxes Users Fileless Malware Digital Service Level Agreement Data Breach Device security Entertainment Server Microsoft Excel Virtual Reality Phishing Mobility tech support Staten Isalnd Meetings Samsung Administration Microchip VoIP Banking Productivity Solid State Drive Printers Virus eWaste IT support New York City Mobile Security SharePoint DDoS Identity Theft Hiring/Firing IT Consultant Automation Travel Cryptocurrency Privacy Business Cards Workplace Tips Recovery BYOD Audit Desktop Devices Email Networking Start Menu Employer-Employee Relationship Training Thank You Music Twitter Office Going Green Telephone IBM Cloud Smartphone Outlook Processor Business Growth Money Screen Reader Safety Windows Drones Wireless Google Drive Best Practice communications Hosted Solution Network Security Software Download Remote Computing Web Server email scam Managed Service Provider Staten Island tech support Physical Security Trends Content Filtering Upgrade 3D Printing Writing Microsoft Office Law Enforcement Gmail Miscellaneous Experience Workstations Customer Resource management Smartphones Conferencing Computer Care Cache Vendor Mangement Government computer repair VoIP Network Management Hardware Solutions Staffing Piracy IT consulting Staten island Evernote managed services Customer Service Website Virtual Assistant Distributed Denial of Service Powerful Technology Solutions Remote Monitoring VPN IT consulting firm Scam Chromebook Motion Sickness Cloud computing Staten Island data recovery Cabling Worker Lithium-ion battery Office Tips Administrator Information Technology Equifax IT support Staten Islans Downloads Retail Fake News IT consulting firms managed IT services staten island IT support NYC computer support firms Regulations Vulnerability tech support Staten Island Internet of Things IT Services Tech Term Congratulations Specifications computer repair Staten Island Office 365 Data storage Big Data Data Backup tech support Displays Tip of the week Passwords Blockchain Software License Best Practices Business Continuity Hardware IT consulting Staten Island Business Mangement Business it support Data Management Botnet end-user files Legislation Tech Terms Hosted Solutions Social Engineering Managed Service Backup Hack Innovation Settings Data Operating System Database Freedom of Information Laptop Tracking Computing Infrastructure Encryption Wi-Fi Antivirus Accidental deletion Advertising Quick Tips Apple Hackers Update IT services Staten Island Proxy Server Digital Payment Electronic Medical Records Hard Drive Disposal Save Money Hacker Disaster Recovery News Outsourced IT Regulation Alert Managed IT Services computer services Ransomware Artificial Intelligence Documents Health IT SaaS Mouse IT consulting company Social Network IT services NYC Backup and Disaster Recovery Upload Tip of the Week Wireless Technology Addiction computer support Staten Island Windows XP Laptops staten island managed services Time Management Tech Support Printer Firewall PDF Communication Computer Public Cloud Nanotechnology Google Calendar Bring Your Own Device Facebook computer services Staten Island Saving Time Flexibility Running Cable Business Management Efficiency Collaboration Text Messaging Network Startup Virtualization Reliable Computing Language Business Metrics Gamification malware Hard disk Browser Staten Island computer support Directions Company Culture Productivity Software as a Service Visible Light Communication Uninterrupted Power Supply Unified Threat Management Bitcoin Unified Communications Domains Websites Vendor Telephone System Relocation YouTube Maintenance Education Browsers Streaming Media Mobile Device Management Supercomputer IT consulting How To Error Cloud Computing IT support firms computer support NYC Memory Hard Drive Robot managed services Staten Island managed it services Multi-factor Authentication Cost Management Access Control Windows 10 Document Management Access Scalability Telephony Virtual Desktop User Tips computer support Search Compliance Management WiFi Two-factor Authentication Navigation Content Bandwidth Spyware Telephone Systems Monitors Social Media Work/Life Balance Computer Malfunction The Internet of Things Apps Sports Multi-Factor Security Username CryptoLocker Budget Google Wallet Social Android Webcam Gadgets Cybersecurity Unified Threat Management Downtime Cybercrime Automobile IT support Staten Island Rental Service Comparison Television Business Technology Computers LiFi Processors Analytics malware worms Staten Island IT support Tablet Politics Spam datto Computing managed IT services NYC Emergency Internet File Sharing History Google Maps Black Market Corporate Profile Proactive IT Emails Paperless Office End of Support Cortana Society Mobile Technology CCTV Information Hacks today ’s organizations Augmented Reality App Security Staten Island IT consulting Data Analysis Managed IT Services Managing Stress IT services New York City Saving Money Google Docs Windows 10 Legal Patch Management IT Management Touchscreen IT Support ransomware attacks Monitoring Workers Google Project Management Vulnerabilities Microsoft Printing Holiday In Internet of Things Network Congestion Data Security Vendor Management Bookmark Employer Employee Relationship IT consulting NYC Deep Learning data recovery Staten Island Data Protection Lenovo User Tip Redundancy Managed IT Tablets Business Computing CrashOverride Password data loss Knowledge Hacking Cleaning Health Mobile Device Applications G Suite Windows 8 BDR Machine Learning

Newsletter Sign Up