Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Nanotechnology Reliable Computing Business Management Redundancy Mouse Freedom of Information Software License Computing Infrastructure Patching GDPR Sports Settings Content Windows 8 Managed IT services Voice over Internet Protocol Cortana Internet Bitcoin Network Congestion Backup Business Company Culture iPhone Virtual Assistant Passwords Computer Malfunction Vulnerability Law Enforcement YouTube Computer Accessories Distribution Customer Resource management Politics Micrsooft Password Google Drive VoIP Distributed Denial of Service Evernote Notifications IP Address Best Practice Telephone Trends UTM App eWaste IT Plan Network Management Management Domains Flexibility Tip of the Week Data storage cyber security Windows XP Download Collaboration Employer Employee Relationship Going Green Sync Running Cable Pain Points Hiring/Firing Compliance Budget Google Play Software Technology Tips Legislation History Save Money Multi-Factor Security Staffing Scam PDF Regulation Directions Messenger Work/Life Balance Word Emails Service Level Agreement WannaCry Gadgets Addiction Encryption Entrepreneur Software as a Service Excel Information Technology IT Management Mobility Save Time Inbound Marketing Smartphones Deep Learning IT Consultant Office Tips Social Engineering Cybersecurity Experience Outsourced IT Business Technology Chamber Websites IT Support Cooperation Social Public Speaking Gamification Outlook Search Cleaning cloud storage Vulnerabilities Business Cards Phone System Office 365 Cryptocurrency Best Practices Multi-factor Authentication End of Support Business Metrics Rental Service CIO Access Control Education Modem BDR Computing Securty Troubleshooting Accountants Phishing Telephony Tracking Wireless Headphones Security Cameras User Training Data Management Fileless Malware LiFi Samsung Mobile Payment HIPAA cloud Capital Upload File Sharing Data Recovery Bandwidth HTML Google Wallet Wireless Technology Google Docs Office Email Banking Privacy Browsers Users Productivity Windows10 SharePoint How To Help Desk Fiber-Optic Cost Management Smartphone Product Reviews Society PowerPoint Blockchain Tablets Health Healthcare Solid State Drive Environment Business Intelligence SaaS VoIP Identity Theft Competition Wireless Screen Reader Desktop Applications Tip of the week Hard Drives G Suite Network Security Hackers Microchip Upgrade Microsoft Excel Saving Money Bluetooth Legal Computer Care Lithium-ion battery Webcam SSID Remote Computing Best Available Google Networking Botnet Update Saving Time Devices Uninterrupted Power Supply Safety Medical IT Downloads Music Hacker clout services outsource cloud computing Fleet Tracking Tech Piracy Router Enterprise Resource Planning Error Hosted Solution Business Owner Fraud 3D Printing Data Loss Startup Trending Data Analysis Windows 7 IBM CrashOverride Black Market A.I. Computer Repair Hack Health IT Retail Drones Statistics Entertainment Current Events Internet of Things Analytics Public Cloud Virtual Desktop Mobile Devices Vendor Mangement Connected Devices Data Security Workplace Tips Integration Automobile IT Support Information DDoS Managed Service Application Social Networking Monitoring Physical Security Proxy Server Thank You Unified Threat Management Security Chromebook switches Licensing Network Chrome Touchscreen User Tip Dark Web Corporate Profile Data Cache Co-Managed IT Logistics Managed IT Service Robot Knowledge Virus Alert Skype Paperless Office Flash Google Calendar cloud computing IT Services Consultation Virtualization Risk Management Travel Money Printing Innovation Project Management Small Business Specifications Employer-Employee Relationship Spam Fake News Digital Payment Windows Server 2008 Digital Signature Teamwork Microsoft Customer Service Apple BYOD Reading email scam Downtime USB Big data outsource cloud storage Equifax Unified Communications Assessment Customer Relationship Management Term Mobile Device Monitors Smart Tech Hard Drive Disposal Two-factor Authentication Bata Backup Taxes Cybercrime Permissions Processing Business Growth Start Menu Intranet Content Filtering Citrix Xenapp Presentation Value Analytic Emergency Microsoft Office Hard Drive Data Backup Firewall Social Media IT service Relocation Hosted Solutions Tactics Remote Monitoring Artificial Intelligence Data Protection Visible Light Communication Computer communications Spyware Memory Bring Your Own Device Processor Proactive IT Gmail Server Augmented Reality Telephone System Miscellaneous Mobile Security Private Cloud Mobile Computing Access the Internet of Things Username Mobile Technology Holiday Marketing Workers Administration Disaster WiFi Read MSP Writing Rapid City Managed IT Managed IT Services Time Management Windows 10 Malware Cost Patch Management Efficiency Tablet Electricity Hacks Document Management User Tips Regulations In Internet of Things Cabling Electronic Medical Records Windows hardware Keyboard Ransomware Processors Conferencing Printers Automation Books Technology User Error Scalability VPN Microsoft 365 Navigation Vendor Management IT Telephone Systems Android Wi-Fi Audit Device security Electronic Payment Government News Worker Meetings Disaster Recovery Administrator Congratulations Unified Threat Management Bookmark Twitter Displays Tech Term Browser Comparison Data Breach Machine Learning Website Documents Quick Tips Television Avoiding Downtime Shortcut Business Mangement Recovery Hacking Apps uptime Printer Programming Language Mobile Device Management Net Neutrality Antivirus Laptop Streaming Media Upgrades IT consulting Facebook Business Computing Supercomputer Web Server Solutions Advertising Asset Tracking Social Network Human Resources Windows 10 Tech Support Digital Virtual Reality Tech Terms Professional Services Storage Computers Operating System Productuvuty Vendor Managed Service Provider Finance Google Maps Heating/Cooling Database Productivity Migration Backup and Disaster Recovery Maintenance Communication Gaming Console Managing Stress CCTV Business Continuity Text Messaging Motion Sickness Data Warehousing

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150