Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

cloud Downtime IT consulting cloud computing Mobile Technology Tablet Wireless Solid State Drive Microchip Antivirus Managing Stress Miscellaneous Current Events Google Maps Motion Sickness Piracy Content Document Management iPhone Content Filtering Social Networking Hard Drive Disposal Enterprise Resource Planning Blockchain Cortana Notifications Download IT Support Wireless Headphones USB Help Desk Apple User Telephone Systems Data Protection Fleet Tracking Tech Term Proxy Server Smartphone Mobile Devices Freedom of Information Read Cabling hardware 3D Printing Redundancy Communication Displays Android Travel cyber security Managed Service Legislation Social Network uptime Unified Threat Management Physical Security Database Productuvuty Intranet Running Cable Business Continuity Customer Relationship Management Gamification Messenger Windows10 Passwords Supercomputer GDPR Wireless Technology Technology Tips Bata Backup Staffing Regulations IT Value Co-Managed IT Fiber-Optic Windows 7 Risk Management Screen Reader MSP Data Loss Firewall Human Resources Business Intelligence Users Business Growth Project Management Black Market Time Management LiFi Network Cache Public Cloud IP Address Electricity Spyware Emails Information Technology Mobility Migration Proactive IT Efficiency Devices Botnet Applications Data Recovery Google Docs IBM Cleaning User Tips Wi-Fi eWaste Health Assessment Computer Malfunction Managed IT Services End of Support Chromebook Going Green Computing Windows 10 Printers Gadgets Documents Compliance Start Menu Administration Business Computing Excel Computing Infrastructure Big data Tip of the week Vendor Management Website Small Business Cybersecurity VPN Hack Tip of the Week outsource cloud computing Virus Hard Drives Unified Communications Service Level Agreement Hacks Competition Computer Repair Mobile Computing IT Consultant Nanotechnology cloud storage Vulnerabilities Artificial Intelligence Printer Legal Trends DDoS Text Messaging Tech Terms Specifications Server Environment Entrepreneur Mobile Device Management switches Analytics Samsung Network Management SSID WannaCry Cost Presentation Scalability Uninterrupted Power Supply Government Malware Security Cameras Username Permissions Office Operating System email scam Error Apps Update Corporate Profile A.I. Best Available Troubleshooting Social Engineering Banking Saving Time Productivity Automation Collaboration Software as a Service Spam Machine Learning Backup Mobile Security Office Tips Telephony Processing Digital Payment Information Printing Workers Bookmark Sports Consultation Workplace Tips Software Hacker Bandwidth Managed IT services Encryption Cost Management Tactics Saving Money Productivity Windows Server 2008 Software License Writing Customer Resource management Tech Web Server Multi-factor Authentication Google Calendar Bluetooth Customer Service Education Privacy Fake News Hiring/Firing Email Data Warehousing Experience Touchscreen Facebook Connected Devices Directions clout services Business Management Microsoft Excel Citrix Xenapp Shortcut Data Management Hosted Solution Relocation HIPAA Unified Threat Management Distributed Denial of Service Thank You Comparison CrashOverride Equifax IT service Vendor Mangement Upload Regulation Sync Access Control Startup History VoIP Congratulations Virtual Reality Remote Monitoring Downloads Google Drive Holiday Phishing Employer-Employee Relationship Network Security Paperless Office Hard Drive Finance Telephone Deep Learning Entertainment Term Data BYOD Gaming Console Windows 8 Data storage Robot Avoiding Downtime Employer Employee Relationship Google Play Data Security Company Culture Outlook Device security Flexibility Mobile Device communications How To Keyboard Remote Computing Public Speaking Business Metrics Mouse Hosted Solutions Securty Vendor Vulnerability Politics Training Television Microsoft Office Safety Business Technology Security Tracking User Tip Windows Fileless Malware Streaming Media Work/Life Balance Audit Managed IT HTML Reliable Computing Business Mangement Capital Cybercrime Gmail Virtualization Heating/Cooling Multi-Factor Security Computers Twitter Accountants IT Support Telephone System Windows XP YouTube Patch Management Internet Websites Health IT Business Cards Budget Business Healthcare Managed Service Provider Upgrade Bring Your Own Device Chrome Identity Theft Patching Asset Tracking Word App Automobile Augmented Reality Modem Monitors Desktop IT Management Analytic Access Password Distribution PowerPoint Retail Micrsooft Microsoft Google CCTV Data Analysis Computer Accessories Browser Flash Trending Disaster Recovery User Error Evernote Data Breach Marketing Emergency Alert Knowledge Virtual Desktop Laptop Worker Private Cloud Two-factor Authentication Law Enforcement Mobile Payment Smart Tech Networking Outsourced IT Ransomware Society BDR Inbound Marketing Disaster Scam Memory News Programming Skype File Sharing G Suite Cryptocurrency Pain Points Taxes Router Google Wallet Hacking Rental Service Social Media SaaS Electronic Medical Records Backup and Disaster Recovery outsource cloud storage Settings Best Practices Windows 10 Books Teamwork Social Data Backup Business Owner Internet of Things Tablets Hackers Product Reviews Technology Management PDF Save Money Office 365 Tech Support IT Plan Browsers Smartphones Innovation Storage Quick Tips SharePoint Fraud Conferencing Visible Light Communication Domains Recovery Processors Computer Computer Care Advertising Network Congestion Save Time Bitcoin Virtual Assistant Application Net Neutrality Addiction Drones the Internet of Things Webcam UTM Reading Music VoIP Money In Internet of Things Processor Upgrades Electronic Payment Statistics Digital CIO Digital Signature WiFi Licensing Navigation Best Practice Lithium-ion battery Phone System Language IT Services Meetings Administrator Monitoring Dark Web Managed IT Service Maintenance Search

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150