About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

UTM Nanotechnology User Tips Spyware Scalability Migration Data Management Human Resources Mobile Device Management cyber security Cybercrime Relocation Social Network BDR Tracking News Avoiding Downtime Bookmark Devices Securty Cost Management Apps Television Efficiency Virus Maintenance Two-factor Authentication HIPAA Vulnerability Bluetooth cloud computing Mobility Budget Office Tips Data Analysis Specifications Competition Vendor Mangement Computing Infrastructure Visible Light Communication Teamwork Retail Conferencing Environment Best Practice Business Cards Fraud Vulnerabilities Addiction Administration Start Menu Storage Business Computing Spam Cleaning VoIP Safety Managed IT Services Gmail Proxy Server Customer Resource management Monitoring Distribution Networking LiFi Search Downtime 3D Printing cloud storage Update Social Networking Disaster Recovery Artificial Intelligence User Tip SaaS Chrome Web Server Worker Presentation Browser Help Desk Access Shortcut Trending Skype Politics Sports Management Comparison Quick Tips Marketing Legal Saving Money Password Technology Tips VPN Computing Remote Monitoring Productivity Freedom of Information Going Green Remote Computing Phone System Accountants Entrepreneur IT Gadgets Identity Theft Multi-factor Authentication End of Support Mobile Payment Phishing Google Wallet Society Legislation Tablets Tech Terms Android Health Passwords Messenger Administrator Assessment Upgrade MSP Holiday Website Printers Thank You IT consulting Telephone Screen Reader Network Congestion Data Breach Meetings Product Reviews IT Support Hack Save Money Machine Learning Paperless Office Business Compliance Software HTML G Suite Electronic Payment Black Market Microsoft Office YouTube Finance Tip of the week Excel Best Practices Travel Intranet Programming Social Bring Your Own Device Employer Employee Relationship Google Calendar Uninterrupted Power Supply PDF Running Cable Supercomputer Network Mobile Device Microsoft Project Management the Internet of Things Dark Web Users Virtual Assistant Apple Network Security Fake News Sync Network Management Healthcare Knowledge Backup Computer Accessories Distributed Denial of Service PowerPoint Encryption Customer Service Google Docs Cache Equifax Virtual Reality Gaming Console Touchscreen Corporate Profile Hacking Google Drive Gamification Windows 10 Software License Regulation Augmented Reality Customer Relationship Management Username Data Health IT Automobile Collaboration Evernote IP Address Business Mangement Office User Trends Office 365 Applications iPhone Router Digital Signature email scam Software as a Service Congratulations Outsourced IT Browsers Computer Repair Digital Time Management Windows Smartphone Electronic Medical Records Writing Directions Hosted Solution WiFi Tip of the Week Windows 8 Telephone Systems IBM Miscellaneous Capital Mobile Computing Processor Entertainment Enterprise Resource Planning Government Data Backup Regulations Business Continuity Twitter Public Speaking IT service Outlook IT Support Business Growth Displays CCTV In Internet of Things Firewall Private Cloud Monitors Consultation Solid State Drive Database Windows 7 Bitcoin Information Technology Document Management Patching Antivirus Cryptocurrency IT Consultant Bata Backup Botnet Deep Learning Laptop Printer Inbound Marketing Flash Unified Threat Management Virtualization Permissions VoIP Business Owner History Samsung Troubleshooting Alert Device security Big data Best Available Social Engineering Recovery Email Productuvuty Data Warehousing Telephony Technology Taxes Innovation Communication Computer Care Unified Threat Management Experience Tablet Business Technology Memory Managed IT Service Windows 10 Data Protection Banking Micrsooft Flexibility App Productivity Upgrades Business Metrics Virtual Desktop Analytic Rental Service Mouse Law Enforcement Keyboard Bandwidth USB outsource cloud computing Managed Service Provider Ransomware A.I. Tech Support Hiring/Firing Cortana Operating System Managed Service File Sharing Workplace Tips Cost Robot Internet Emergency Chromebook SharePoint Business Management Education IT Services Hard Drives Domains Windows XP Piracy Word Disaster Drones Webcam How To Vendor Management Hard Drive Disposal Google Mobile Technology Current Events Reliable Computing IT Management Server Wireless Headphones Mobile Devices Information Hackers Data Recovery Work/Life Balance Hard Drive Hosted Solutions Tech Term Digital Payment WannaCry CIO Telephone System Proactive IT Settings Save Time Service Level Agreement BYOD Upload Public Cloud Data Security Content Fiber-Optic CrashOverride Cybersecurity Hacker Windows Server 2008 Reading hardware Managed IT Fileless Malware Read Language Backup and Disaster Recovery Vendor Motion Sickness Application Analytics Internet of Things Websites Value Net Neutrality Managed IT services Employer-Employee Relationship Microsoft Excel DDoS Smart Tech Managing Stress Citrix Xenapp IT Plan Asset Tracking Co-Managed IT Audit Streaming Media Access Control Download Multi-Factor Security Malware Navigation Connected Devices Blockchain Company Culture Notifications Downloads Computer Redundancy Tactics Hacks Startup Saving Time Wireless Technology Risk Management Emails Electricity Heating/Cooling Facebook User Error Windows10 Data storage Text Messaging cloud clout services switches Social Media Pain Points Wi-Fi Privacy Fleet Tracking Statistics Staffing Computer Malfunction Data Loss Security Small Business Physical Security Error Cabling uptime communications Content Filtering Microchip outsource cloud storage Advertising Business Intelligence Books Licensing Desktop Music Workers Documents Wireless Processors Printing Google Maps Automation Computers Unified Communications Scam Lithium-ion battery eWaste Mobile Security Training Smartphones Money Patch Management

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150