Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, March 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Wi-Fi Worker Blockchain Windows 7 Cache IT services NYC Windows 10 Privacy Freedom of Information PowerPoint Audit Unified Threat Management Botnet Email Virtual Desktop Society Document Management Machine Learning Administration IT consulting company Music Health IT Managed Service End of Support Virtualization Internet of Things Network Congestion Fileless Malware managed it services Cloud computing Staten Island Smartphones In Internet of Things Big Data Efficiency Telephone Alert Flexibility Password Patch Management Update Advertising Computer Care Facebook Vendor Mangement Healthcare Firewall YouTube Google Drive Microsoft 365 Technology communications Encryption Mobile Device Management Hard Drive Disposal Downloads Writing IT Services Computer Digital IT support firms WiFi Domains Microsoft Piracy Unified Threat Management 3D Printing Apple Communication IT support New York City Staffing Business Technology Mobile Security Windows 8 Laptops Network Management Lenovo History Directions Customer Service Social Network Search BYOD Comparison Solutions Robot Money Compliance Analytics managed services IT consulting Fake News IT consulting firm Information computer services Google Wallet Tactics Apps Two-factor Authentication Proactive IT News Backup and Disaster Recovery Mobile Device Staten Island IT support IT Support Business Cards Google Play Staten Island tech support Innovation Printer Access Access Control Politics Mobile Technology Entertainment SharePoint Meetings Windows G Suite Maintenance Automation Users Digital Payment Bluetooth IT services Staten Island Business Management Vulnerabilities SaaS email scam Virus data recovery Staten Island Bitcoin computer support NYC managed services Staten Island Hacking Accountants Proxy Server computer repair The Internet of Things Motion Sickness Monitoring malware Hard disk Saving Money Taxes Productivity Wireless Congratulations Hacks Samsung App Printing Relocation Accidental deletion Hard Drive tech support Staten Isalnd Malware IT consulting firms Database IT consulting Staten island Processors Mouse IT support Staten Islans Processor Conferencing Black Market Hiring/Firing Google Maps Company Culture Distributed Denial of Service IBM Office 365 Budget Business HTML Webcam Uninterrupted Power Supply Project Management Screen Reader Law Enforcement Television Trends Integration Staten Island computer support Cloud Chromebook Experience Antivirus Productivity Going Green Lithium-ion battery Cryptocurrency iPhone Tracking Telephony data recovery Data Protection Memory Windows 10 Start Menu Redundancy IT support Browser Data Backup Social Media Android Network How To Navigation Private Cloud Telephone System Legislation Emails Hacker ransomware attacks Tip of the week Gmail Emergency computer support Staten Island Tablets Google Streaming Media Quick Tips Websites Software Work/Life Balance CCTV it support Wireless Technology Managing Stress managed IT services NYC Microsoft Excel Paperless Office Vulnerability Computing Infrastructure Reliable Computing Remote Monitoring Artificial Intelligence malware worms Tech Scalability Displays Computer Malfunction Best Practice Bookmark Identity Theft Content Cabling Google Calendar Electronic Medical Records Social Engineering computer repair Staten Island VoIP Web Server Disaster Recovery Wireless Headphones Equifax IT services New York City Flash Knowledge Voice over Internet Protocol tech support Staten Island Vendor Management Printers Excel Workplace Tips Virtual Assistant Managed Service Provider Hackers Router Language Devices computer support firms Username Upgrade Security Cameras Hardware Solutions data loss Data Office Tips Business Growth Scam Operating System Hack Download Twitter Legal Saving Time Safety CryptoLocker Monitors BDR Cortana Tech Terms Data Security end-user files Regulation VPN Hosted Solution Employer Employee Relationship User Tip Miscellaneous Cleaning Gamification Phishing Cooperation Unified Communications Training Disaster Software as a Service Professional Services Backup Deep Learning Service Level Agreement computer services Staten Island Recovery Data Analysis Smartphone CrashOverride Word Business Metrics Tech Term Education Applications today ’s organizations IT Consultant Spyware Specifications Public Cloud Google Docs Computing Multi-Factor Security Outsourced IT Business Continuity Virtual Reality Software License Remote Computing Rental Service Hosted Solutions Small Business Touchscreen Network Security Browsers Tip of the Week Managed IT Drones Cybercrime IT consulting Staten Island Ransomware Data Management Vendor eWaste IT consulting NYC Tech Support File Sharing Medical IT Desktop Office Text Messaging Regulations Workstations Corporate Profile Business Computing datto Settings Collaboration Internet Government Managed IT Services Website staten island managed services Holiday Data Breach Help Desk Server Physical Security Best Practices Documents Addiction Microchip VoIP Outlook Multi-factor Authentication Employer-Employee Relationship Windows XP Hardware Telephone Systems Startup Mobile Devices IT Management Cost Management Modem Laptop Business Mangement Running Cable Time Management Content Filtering Microsoft Office Powerful Technology Solutions Customer Resource management DDoS Gadgets Visible Light Communication SSID Mobility IT support Staten Island Health Nanotechnology Augmented Reality Securty Bring Your Own Device Spam Notifications Security Tablet Save Money PDF Thank You Error Management computer support Computers Solid State Drive Device security Supercomputer managed IT services staten island Information Technology User Tips Banking Evernote Retail Social Automobile Managed IT Services Downtime Upload Sports Cybersecurity Travel Cloud Computing IT support NYC Staten Island IT consulting Workers Passwords Administrator LiFi Networking Term Data storage Bandwidth tech support

Newsletter Sign Up