Fuse Networks Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 19 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Tech Term Network Security Business Computing Hackers Privacy Innovation Productivity Data Backup Collaboration Android Cybersecurity User Tips Data recovery IT Support Computer Data Software Efficiency Communications Email Communication Google Malware Mobile Device Internet IT Services Business Management Office 365 Hosted Solutions Smartphone Hardware VoIP Mobile Devices Small Business Artificial Intelligence Access Control Applications Facebook Managed Service Backup Social Media Smartphones Cloud Business Technology Information Phishing Blockchain Cybercrime Microsoft Office Cost Management Browser Internet of Things Vulnerabilities Cloud Computing Saving Money Data Security Business Automation Mobile Device Management Windows 10 Holiday Two-factor Authentication Passwords Workplace Tips Apps Maintenance Vulnerability BDR Ransomware Scam Quick Tips Gmail Disaster Recovery Hacking Users Data loss Managed IT services App Apple Outsourced IT Tech Terms Saving Time Document Management Mobility Cooperation Network Websites Printer Bitcoin Conferencing Microsoft Vendor Alert Augmented Reality Healthcare Bandwidth Patch Management Data Breach IT Management Google Maps Social Engineering Remote Monitoring Update Tactics Electronic Medical Records Virtualization Modem Cleaning BYOD Big Data Data Analysis Legal Term Legislation Trends Website CIO Comparison Microsoft 365 Tip of the week Backup and Disaster Recovery Error Training Miscellaneous Knowledge Vendor Management Google Calendar Professional Services Identity Theft Navigation Addiction Server User Tip Downloads SSID Distributed Denial of Service Information Technology Computers Fileless Malware Hard Drive Law Enforcement Google Play Gamification Bookmark Specifications Managed IT Services Mobile Security Twitter Telephone Computing Infrastructure Devices Equifax Service Level Agreement Voice over Internet Protocol Cryptocurrency Laptop Screen Reader Spam Cortana Freedom of Information Nanotechnology Windows 10 Directions Hard Drive Disposal Social Network Health IT WiFi Security Cameras SharePoint Downtime Emails Browsers Television Managed Service Provider Unified Communications Evernote Networking Compliance Startup Going Green Business Continuity NCSAM Google Docs iPhone Desktop Monitoring Machine Learning Disaster Analytics Medical IT News Mobile Technology Operating System Travel Audit Cost email scam HTML Paperless Office Customer Resource management Social project management Piracy Bluetooth Mouse Digital Multi-factor Authentication Printing Business Cards Regulations Download IT Retail Management VPN Network Management Emergency Proxy Server Data Management Fake News Virtual Reality Username Microchip eWaste Database Telephone System Sports Router Money Software License Wireless Headphones Content Productivity Entertainment Virtual Assistant Device security Government Tech Upload Support Windows 7 Excel Antivirus Chromebook Computing Gadgets Budget Robot Data Protection Accountants Encryption Help Desk PowerPoint Microsoft Excel Company Culture Fuse Networks Computer Care Processor IP Address Hard Drives Customer Service Search Mobile Office Upgrade Domains Solutions Wireless Regulation Printers Public Speaking Integration Presentation Wi-Fi Lithium-ion battery Hiring/Firing Managing Stress Wireless Technology 5G Tech Support Safety Multi-Factor Security IBM Fun Marketing Hacker Employer-Employee Relationship The Internet of Things Competition Customer Relationship Management