About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Downloads Email Automobile IT Plan Digital Modem Wireless Headphones App Writing Pain Points Computer Malfunction Language Heating/Cooling Database Net Neutrality outsource cloud storage Save Money Fraud File Sharing Electronic Payment Bandwidth Tech Support Processor cloud Equifax Mobile Security Recovery Network Security Software as a Service Public Cloud Gaming Console Wireless Document Management Computer Care Rental Service Managed Service Provider Distribution Knowledge Managed IT Services IT Fiber-Optic Hacking End of Support IT Support Innovation Data Warehousing Spam Emergency Micrsooft Marketing Data Security Money Windows 7 Law Enforcement Bring Your Own Device Black Market Phone System Data Recovery Worker Congratulations Access 3D Printing Multi-Factor Security Sync Excel CrashOverride Analytics Specifications Hack In Internet of Things Permissions Screen Reader Nanotechnology Administration Unified Threat Management Emails Monitoring YouTube Digital Payment Virtual Desktop Trends Television Regulations Teamwork LiFi Virus Antivirus Tech cloud computing Data Breach Storage Holiday Productuvuty Taxes switches Proactive IT Word Web Server Keyboard Corporate Profile IBM Startup Lithium-ion battery CIO Small Business Update Enterprise Resource Planning Mobile Payment Management Proxy Server Staffing Printer Maintenance Apple Network Management Hackers SSID Miscellaneous Scam Hard Drive Browser Managing Stress Robot Cache Environment Vulnerability Displays Microsoft Office Managed IT Travel Telephony Product Reviews Running Cable Social Network Service Level Agreement Tablet Notifications Experience Telephone Systems IT consulting Uninterrupted Power Supply Paperless Office Data Backup Risk Management Hiring/Firing Customer Relationship Management Username Workplace Tips User Tip Solid State Drive Artificial Intelligence Inbound Marketing GDPR Security Compliance Hacker Asset Tracking Internet of Things Hacks Programming Virtual Assistant Assessment Fileless Malware History Thank You Drones Twitter Fleet Tracking Facebook Two-factor Authentication Tracking Visible Light Communication Employer-Employee Relationship Training Books Smartphone Analytic Fake News Remote Monitoring Remote Computing PowerPoint Desktop Managed IT services Trending Touchscreen Intranet Cryptocurrency Google Wallet Term Social Wireless Technology Business Mangement Backup Sports VoIP Microsoft Excel Vulnerabilities IT Management Gmail Conferencing Work/Life Balance Best Available Addiction How To Machine Learning clout services Physical Security News Entertainment Software License Securty IT service Safety Distributed Denial of Service Users Cost cloud storage Piracy Cost Management Passwords Flash Computer Accessories Social Networking Upgrade Malware Avoiding Downtime Mobile Device Management Tip of the week User Tips Information Botnet Education Legal Backup and Disaster Recovery Spyware Flexibility Identity Theft Productivity Memory User Microsoft Phishing Firewall Disaster Hard Drive Disposal Computer Printers Mouse Google Docs Dark Web Vendor Management Mobile Devices Tech Term email scam the Internet of Things Google Hosted Solution Comparison Windows10 Security Cameras Relocation Legislation Troubleshooting BDR SharePoint Android Read Retail Upgrades Music Value PDF Business Growth Business Computing Office Virtual Reality Networking Business Management Cybersecurity Website Search HTML Consultation Outsourced IT DDoS Regulation Data storage A.I. Entrepreneur Processing Employer Employee Relationship Internet Time Management Statistics Browsers Microchip Content Productivity Telephone WannaCry Data Protection Banking Customer Resource management Office 365 Data Analysis Telephone System Accountants Managed Service Business Owner Network Workers Patching Smart Tech Redundancy Quick Tips Patch Management Social Media Webcam Download Tip of the Week Advertising Tablets User Error Electricity Streaming Media Printing IT Services Connected Devices Network Congestion Messenger Data Computing Infrastructure Audit Business Continuity Windows 10 Domains Downtime Finance Start Menu Windows Project Management Wi-Fi Google Drive Reading Unified Threat Management Co-Managed IT Google Calendar Content Filtering Bookmark Outlook Blockchain Human Resources Vendor Mangement Evernote Motion Sickness cyber security Privacy Unified Communications Encryption Windows 8 Government MSP Google Play IT Consultant Technology Tips Applications Devices BYOD Freedom of Information WiFi Augmented Reality Information Technology Mobile Device Disaster Recovery VoIP Managed IT Service Processors Best Practice IP Address Current Events Text Messaging Windows 10 Save Time Automation Bitcoin Bluetooth Virtualization Windows Server 2008 Social Engineering Capital Cabling Private Cloud Politics Gadgets SaaS Tech Terms Scalability Health Server Competition Mobility Error Windows XP Customer Service Deep Learning Software Budget Hosted Solutions Best Practices Ransomware Cybercrime Chrome Vendor Meetings Company Culture Shortcut Samsung Business Intelligence Hard Drives Data Loss Skype Licensing Communication Multi-factor Authentication Administrator Device security Data Management Office Tips Public Speaking Application Efficiency Websites Mobile Computing Settings Navigation Google Maps Collaboration Electronic Medical Records Access Control Business Health IT Cleaning Computers Documents UTM Business Cards Citrix Xenapp Migration eWaste VPN Tactics Business Metrics Bata Backup Business Technology Upload Saving Time Gamification iPhone HIPAA Supercomputer Smartphones Chromebook Going Green Saving Money Digital Signature Alert Directions Operating System Computing Technology Laptop uptime Reliable Computing communications Apps G Suite Cortana Router Password hardware CCTV IT Support Computer Repair USB Big data Mobile Technology Monitors Society Help Desk Healthcare outsource cloud computing Presentation

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150