Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.

Is It Possible For Machine Learning to Help Treat ...
Disasters Aren’t Always Caused By Disasters
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Technology Best Practices Managed IT Services Cloud Business Computing Email Privacy Malware Hackers IT Infrastructure Management Hosted Solutions Business Continuity Internet IT Companies in Tampa Business Software Data IT Support Services Productivity Business Mobility Data Backup Business IT Solutions Outsourced IT I.T. Management Microsoft Network Security Computer Managed Service Provider IT Professional Services Productivity Mobile Devices Custom Business Solutions Tech Term IT Management Ransomware Business Applications Data Recovery IT Business Solutions Innovation Cloud Computing Technology Consultants Google Hardware Android Internet of Things User Tips Managed IT Service in Florida Business IT Support Managed IT Windows 10 Managed IT Service Small Business Managed Services in Florida Windows Disaster Recovery I.T. Support Remote Monitoring IT Support Upgrade Communication Backup Collaboration IT Support Services in Tampa Browser IT Risk Management Workplace Tips Dynamic Solutions I.T. Services Efficiency IT Services in Florida Smartphones Business Management Encryption Holiday Data Management Smartphone IT Outsourcing in Tampa Paperless Office Gmail Social Media Save Money Phishing Artificial Intelligence Managed Services IT Service Server Microsoft Office Network IT Support in Tampa IT Managed Services Passwords Managed Services in Tampa Bay BYOD Cybersecurity App Managed IT Services VoIP Mobile Device Management Windows 10 Mobile Device Office 365 Vendor Management Employer-Employee Relationship Tampa IT Support Bandwidth Applications Website Bring Your Own Device Customer Relationship Management Firewall Tech Companies in Tampa IT Services in Tampa Antivirus BDR communications Operating System Unified Threat Management Document Management IT Company Business Plan Automation Project Management Information Vulnerability IT Outsourcing Business IT Support Services Content Filtering Word Two-factor Authentication Risk Management Managed Service in Tampa Scam IT Outsourcing in Florida Apple Wi-Fi Chrome Small Business IT Solutions Infrastructure Computer Networking Tip of the week Government Compliance Facebook IT Vendor Management Healthcare IT Service Management Data Computer Services Router Wireless Technology Storage Regulations Unified Communications Data loss Retail Managed Service Data storage WiFi Customer Service IT Management Services Settings IT Company Tablet Help Desk Robot Wireless Office Telephone Systems Maintenance The Internet of Things Miscellaneous Saving Money Remote Computing Hosted Solution Money Apps Computer Hardware Repair SaaS Big Data Data Security Quick Tips Analytics Mobile Computing Blockchain IT solutions Computer Networking Services IBM Users Social Laptop Monitors Redundancy Remote Workers Outlook How To Budget User Error Patch Management IT Consulting File Sharing Net Neutrality Digital Payment Server Management Computing Solid State Drive Network Management IT Support Helpdesk LiFi Virtual Desktop Files Access Control HIPAA Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality IoT IT Management Service Employees Software as a Service Alert Internet Exlporer Assessment Company Culture Managed IT Outsourcing Virtual Private Network Virtualization Administration Business Continuity Services Virtual Reality Politics End of Support Mobility IT Companies in Florida Business Technology Spam Mobile Security Downtime Network Congestion Business Application Flexibility Printing Smart Technology Google Drive YouTube Recovery Uninterrupted Power Supply Office Tips Management Computer Support Information Technology Machine Learning Licensing Remote Monitoring and Management Search Computer Network Services Mouse Presentation VPN Training I.T. Company Google Docs Tech Support Techology Language Microsoft Affiliate Program Time Management Vulnerabilities Authentication Cyber Monday Hard Disk Drive Identities Samsung Lenovo Permissions Enterprise Resource Planning Bookmarks Healthcare IT IT Support Companies in Tampa Google Calendar Chatbots Software Tips WPA3 Financial Professional Services Save Time Health Writing Hard Drive Features Sports Computer Repair Cryptocurrency Humor Password Chromebook Printer Wearable Technology Server Hosting in Florida Permission Managed it Services in Tampa Travel Break Fix Connectivity Server Hosting Disaster Resistance Computing Infrastructure Microsoft Business Solutions Identity Theft Geography Safety Authorization Marketing IT Tech Support Hacks Hacking IT Vendor Management in Tampa Sync Modem Superfish Fraud Dark Data Computer Care Firefox Mobile Favorites IT Support and Solutions Private Cloud Legislation Application Identity Fleet Tracking Cortana Procurement Virtual Assistant Backups Social Engineering VoIP Cache Electronic Health Records Bitcoin Managed Services in Floirda Tampa IT Services Statistics Test Education Google Wallet Undo Managed Service Providers Dark Web Monitoring Alt Codes Business Continuity Service Providers Proactive IT Alerts Touchscreen High-Speed Internet Technology Consulting Firms Current Events Network Support in Florida Mobile Device Managment Intranet Cookies Careers Legal Domains Consulting Services Conferencing History User IT Managed Service in Tampa Comparison Cabling Health Care IT Services Asset Tracking Knowledge Security Cameras Information Technology Consulting Digital Recycling Cyberattacks Buisness Windows 8 Professional Service Best Practice IT Company in Tampa Websites USB SharePoint IT Technicians Google Maps Outsourced Computer Support Bluetooth MSP Fun RMM Drones Business Growth Competition Tech Company in Tampa Meetings Data Warehousing Star Wars Consulting Typing Data Breach Cooperation Development Zero-Day Threat Going Green Digital Signature Hard Drives Technology Tips Nanotechnology IT Service in Tampa Jobs IT Consulting Services Public Speaking Networking Service IT Consultation Managing Stress Hacker Instant Messaging Top IT Outsourcing Company Disaster Avoiding Downtime Help Desk Support in Tampa Specifications Social Networking Computers Business IT Solutions Mail Merge OneNote Experience Remote Worker Deep Learning Microsoft Excel Spyware eWaste Read Only Trending IT Managed Service Provider Heating/Cooling Managed Service in Florida Downloads Mirgation Proactive Tech Terms Notes Corporate Profile Electronic Medical Records Utility Computing Managed Services Provider Halloween IT Consulting Service Technology Laws Staff Cables Backup and Disaster Recovery Co-managed IT G Suite Screen Reader Programming Server Hosting in Tampa Hotspot IT Solutions for Small Business Enterprise Content Management Finance Gadgets Help Desk Support Automobile Black Friday Motherboard Display Full Service IT Address Employee-Employer Relationship ROI CIO Multi-Factor Security Migration Shortcut Theft PowerPoint Point of Sale WannaCry Data Technology E-Commerce Scary Stories Unified Threat Management Operations Servers Wires Human Error Cost Management Distributed Denial of Service Smart Tech Managed Servers Work/Life Balance Unsupported Software Mobile Office Business Appplications Administrator Virus Web Server Cleaning Relocation Physical Security Hiring/Firing Saving Time Law Enforcement Mobile Data Personal Information Notifications How To Cameras Regulation Motion Sickness Cybercrime Gadget Emergency Staffing Upgrades Error Wasting Time CCTV Lithium-ion Battery Running Cable Crowdsourcing GPS 3D Printing Public Cloud Taxes Botnet Twitter Webcam Telephony Supercomputer 5G IT Consultant Refrigeration Thank You Tracking IP Address I.T. Managament CrashOverride Printers Emoji Processors Update IT Budget Black Market Congratulations

Latest Blog Entry

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login