Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Technology Managed IT Services Cloud Business Computing Privacy Email Malware IT Infrastructure Management Business Continuity Hackers Hosted Solutions Internet IT Companies in Tampa Business Business Mobility IT Support Services Business IT Solutions Software Data Data Backup I.T. Management Microsoft Outsourced IT Productivity Network Security IT Professional Services Managed Service Provider Computer Custom Business Solutions Productivity Mobile Devices IT Management Tech Term Business Applications IT Business Solutions Data Recovery Ransomware Technology Consultants Innovation Windows 10 Managed IT Service in Florida Android Business IT Support Managed IT Managed IT Service Windows Disaster Recovery Internet of Things Cloud Computing Managed Services in Florida I.T. Support Google User Tips Workplace Tips Browser Remote Monitoring Dynamic Solutions I.T. Services Communication IT Support Services in Tampa Hardware IT Risk Management Backup Smartphone Data Management Encryption Upgrade IT Outsourcing in Tampa IT Support Collaboration IT Services in Florida Smartphones Server Network Managed Services Artificial Intelligence Social Media IT Service Small Business Gmail IT Support in Tampa Cybersecurity Microsoft Office Managed Services in Tampa Bay Save Money Efficiency Phishing Business Management Mobile Device Management BYOD App Mobile Device Holiday IT Managed Services Managed IT Services Tampa IT Support Bandwidth Antivirus Operating System Windows 10 Vendor Management Tech Companies in Tampa VoIP BDR Unified Threat Management Passwords Applications Customer Relationship Management Website IT Services in Tampa Paperless Office Office 365 Firewall Business IT Support Services Facebook Infrastructure Managed Service in Tampa Small Business IT Solutions Risk Management Healthcare Computer Networking Tip of the week IT Outsourcing in Florida Government Wi-Fi Chrome Bring Your Own Device Content Filtering Data Computer Services IT Service Management IT Company Business Plan Apple Compliance Word Two-factor Authentication IT Vendor Management Project Management Vulnerability IT Outsourcing Unified Communications Help Desk IT Management Services Telephone Systems Analytics Mobile Computing Miscellaneous Settings Maintenance IT Company Data Security Big Data Blockchain Robot Wireless Automation Money SaaS Router Employer-Employee Relationship Computer Hardware Repair Wireless Technology Managed Service Retail Information WiFi Customer Service Hosted Solution Document Management Office Data loss communications IT solutions Data storage The Internet of Things Storage Regulations Saving Money Remote Computing IT Consulting Mobile Security Spam Budget User Error Virtual Private Network Apps Assessment Smart Technology Solid State Drive Managed IT Outsourcing IT Support Helpdesk Recovery Business Technology LiFi Virtual Reality Politics Mobility Microsoft Virtual Server Hosting in Tampa and Florida IT Companies in Florida Information Technology Augmented Reality Business Continuity Services Presentation IT Management Service Remote Monitoring and Management Outlook VPN Remote Workers Laptop Net Neutrality IBM Uninterrupted Power Supply Administration Quick Tips End of Support Google Drive Machine Learning Licensing Computer Network Services Mouse Training Computer Support Business Application Downtime I.T. Company Redundancy Flexibility IoT Alert Computer Networking Services How To HIPAA Virtual Desktop Patch Management Office Tips File Sharing Digital Payment Server Management YouTube Computing Search Scam Internet Exlporer Network Management Monitors Network Congestion Virtualization Users Files Tablet Google Wallet OneNote Disaster Avoiding Downtime Writing Networking Bitcoin Managing Stress Instant Messaging Public Speaking Touchscreen Server Hosting in Florida Specifications Social Networking Network Support in Florida Mobile Device Managment Heating/Cooling Cabling Microsoft Excel Business Continuity Service Providers eWaste Read Only Microsoft Business Solutions Sports Computer Repair Downloads Mirgation IT Managed Service in Tampa Technology Consulting Firms Current Events Proactive Tech Terms Safety Marketing Screen Reader Tech Company in Tampa Meetings Information Technology Consulting Legal Utility Computing Managed Services Provider Digital Dark Data Technology Laws Staff IT Company in Tampa Websites Cables Backup and Disaster Recovery Google Maps Bluetooth Drones Employee-Employer Relationship Gadgets Social Engineering Cortana Hotspot Windows 8 Professional Service Enterprise Content Management Finance Programming Tampa IT Services Black Friday Motherboard Mail Merge Careers Education Management Consultation Multi-Factor Security Migration Help Desk Support in Tampa Going Green Distributed Denial of Service Smart Tech IT Consulting Services E-Commerce Cost Management Spyware Consulting Services Alt Codes Unified Threat Management Operations Managed Service in Florida Top IT Outsourcing Company Wires Human Error Health Care IT Services G Suite Corporate Profile Knowledge Techology Language IT Managed Service Provider Vulnerabilities Authentication Tech Support Outsourced Computer Support Cyber Monday WPA3 Address IT Service in Tampa Jobs Fun Lenovo Permissions Server Hosting in Tampa IT Consulting Service Enterprise Resource Planning Bookmarks Health Buisness Google Calendar Chatbots Help Desk Support Automobile Printing Business IT Solutions Break Fix Connectivity Point of Sale Hard Drive Features Service IT Typing Printer Wearable Technology Application Permission Password Shortcut Computers Modem Hacking WannaCry Experience Deep Learning Disaster Resistance Computing Infrastructure Geography Authorization Servers Hacker Fleet Tracking Hard Disk Drive Electronic Medical Records Superfish Fraud Mobile Favorites Time Management Trending Legislation Identity Intranet Display Full Service IT Co-managed IT Dark Web Samsung Google Docs Cache Electronic Health Records Undo IT Solutions for Small Business Halloween Access Control IT Support Companies in Tampa Social Test Software Tips Software as a Service Cookies Managed it Services in Tampa Travel Save Time Monitoring Proactive IT Alerts USB Chromebook Healthcare IT High-Speed Internet Employees Asset Tracking History User Data Technology Server Hosting Cryptocurrency Humor Company Culture Conferencing Identity Theft Domains CIO Comparison IT Vendor Management in Tampa Sync Data Warehousing Recycling Cyberattacks Business Growth Computer Care Competition Firefox Microsoft Affiliate Program Scary Stories SharePoint IT Technicians IT Support and Solutions IT Tech Support Hacks MSP RMM Best Practice Technology Tips Nanotechnology Managed Service Providers Backups Star Wars Consulting Digital Signature Hard Drives VoIP Identities Data Breach Cooperation Managed Services in Floirda Development Zero-Day Threat Statistics Emergency Hiring/Firing Gadget Thank You Personal Information Staffing Mobile Data Error IT Consultant CCTV Refrigeration How To Congratulations Theft Crowdsourcing Printers GPS Virus Public Cloud Twitter Webcam Taxes Upgrades Cybercrime Botnet Telephony Supercomputer Financial Tracking Processors Saving Time CrashOverride 3D Printing Running Cable Emoji I.T. Managament Black Market Update IT Budget Procurement Managed Servers Work/Life Balance Business Appplications Administrator 5G Web Server Cleaning Relocation Regulation Lithium-ion Battery IP Address Law Enforcement Notifications Unsupported Software Private Cloud Mobile Office Motion Sickness Cameras Physical Security

Latest Blog Entry

While smartphones and tablets can help businesses quite a bit, they can also be quite detrimental to their success. If you can get past the issues related to employees bringing their own devices to the workplace, then you’ll be able to save a considerable amount of time and ...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login