Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Collaboration Printers Google Play Update tech support Staten Isalnd Business Cards Information VoIP Botnet Backup and Disaster Recovery Settings Workstations Networking YouTube Computing Running Cable tech support Apple today ’s organizations Managed Service Provider Outsourced IT Employer-Employee Relationship communications Time Management Encryption data recovery Music Augmented Reality Network Congestion Writing Wireless Tech Virtual Desktop Mobile Technology Safety Business Metrics Private Cloud Hack Identity Theft Trends Service Level Agreement Corporate Profile Communication IT consulting Staten island Proactive IT IT consulting Staten Island Data Backup Startup Remote Monitoring Software Productivity Database Data Management Artificial Intelligence Cloud computing Staten Island History Drones data recovery Staten Island Quick Tips Gamification Wi-Fi email scam end-user files Compliance Samsung Access Control Management Managed IT Services Meetings Laptops Telephony Password Applications Processor Word Sports Cloud Computing IBM Language Vendor Mangement Knowledge eWaste tech support Staten Island Security Cameras Lenovo Reliable Computing Nanotechnology Processors computer repair it support data loss News Business Management Innovation Google Drive IT Consultant Browser Uninterrupted Power Supply Microchip Business Computing Workplace Tips Printer Healthcare Wireless Technology Proxy Server Data Security SSID Miscellaneous Help Desk Hackers Start Menu Google Tablets Data Analysis Emails Disaster Recovery Google Docs Smartphones computer services Staten Island Outlook Unified Threat Management IT support firms Telephone End of Support Facebook Computing Infrastructure Mobile Devices Document Management Domains User Tips Cybercrime IT support New York City Telephone Systems Fileless Malware Screen Reader Upgrade Efficiency Vulnerabilities Blockchain Hosted Solutions Laptop Business Mangement Malware Redundancy Experience Downtime Memory Public Cloud SaaS Hard Drive Google Maps Vulnerability Electronic Medical Records Freedom of Information Social Media Error Printing Vendor Office Data Protection Google Calendar Passwords Managed IT Services datto Information Technology HTML Accidental deletion Small Business Access Remote Computing Microsoft Excel IT services NYC LiFi Mobile Device Management Users Data Breach Websites Staten Island IT support Modem Flash Technology Cache Digital Payment Society Best Practices Addiction Device security Workers Computers Office 365 Content Hacker Mobile Device staten island managed services Mobile Security Supercomputer Unified Communications Staffing Term Education IT consulting managed it services Virtualization Antivirus Robot Windows XP Virtual Assistant Scalability Regulations Piracy Training Gmail How To Legislation Regulation Emergency IT Support Work/Life Balance Tech Terms Two-factor Authentication Machine Learning Hardware Specifications Spyware Staten Island IT consulting Staten Island computer support File Sharing Webcam Multi-factor Authentication Equifax computer support firms Search G Suite Hacks App Website Thank You Tip of the Week PDF Navigation managed services Staten Island Visible Light Communication Staten Island tech support VoIP Windows Data storage Vendor Management IT consulting firm Privacy CryptoLocker Business Lithium-ion battery Managed Service Virtual Reality Audit IT Services Mouse managed IT services NYC Notifications Paperless Office Cloud managed IT services staten island Solid State Drive Retail Health Flexibility Streaming Media computer services Phishing Server CCTV Computer IT services New York City Desktop Hiring/Firing Windows 10 managed services Bandwidth Data Windows 10 Excel Operating System Twitter Touchscreen Accountants Bring Your Own Device Disaster Internet Evernote Tip of the week Microsoft Office Bluetooth Worker Social computer support Television IT consulting company Mobility Administrator Going Green Hard Drive Disposal Tech Support Downloads Big Data Upload CrashOverride computer support Staten Island Microsoft Holiday IT support Documents Business Continuity Devices Computer Care Network Management computer support NYC Powerful Technology Solutions Productivity Distributed Denial of Service Social Network Cabling Banking Relocation Customer Service Cybersecurity Software License Windows 8 Hacking DDoS Browsers IT support Staten Islans SharePoint malware Hard disk BDR Health IT Business Technology User Tip IT services Staten Island WiFi Fake News Law Enforcement Hardware Solutions Comparison Securty Telephone System Recovery Scam Motion Sickness Administration Business Growth Username Android Project Management Virus Spam Government Conferencing Automation Bitcoin Customer Resource management IT Management malware worms Hosted Solution Smartphone Text Messaging Download Apps Deep Learning Backup Software as a Service Content Filtering IT consulting firms Automobile Analytics The Internet of Things Cleaning Social Engineering Tactics Managing Stress Travel Network Security Tracking Web Server Google Wallet Best Practice Entertainment ransomware attacks Tech Term Network Digital Advertising Managed IT Save Money Monitors Rental Service Security Monitoring Cryptocurrency Firewall computer repair Staten Island Internet of Things Patch Management Saving Money Saving Time Tablet Legal Money Black Market Ransomware Budget Multi-Factor Security Wireless Headphones Computer Malfunction Taxes In Internet of Things VPN BYOD Maintenance IT support NYC Employer Employee Relationship Congratulations 3D Printing Alert Unified Threat Management Cost Management Company Culture Physical Security Chromebook Cortana Bookmark Office Tips Email IT support Staten Island IT consulting NYC Gadgets Displays Politics Router Directions

Newsletter Sign Up