Fuse Networks Blog

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

Hackers Continuously Target Major Sporting Events
How Are Your Protecting Your Collaborative Data?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 21 2018

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Tech Term Best Practices Hackers Network Security Privacy Business Computing Data Backup Computer Android IT Support Software Efficiency Data recovery Productivity Innovation Collaboration Cybersecurity User Tips Internet Email Data Communication Mobile Device Malware Google Cloud Communications Cybercrime Small Business IT Services Business Management Applications Cost Management Browser Managed Service Artificial Intelligence Office 365 Backup Business Technology Smartphone Hardware Mobile Device Management Phishing Blockchain Two-factor Authentication Passwords BDR Maintenance Ransomware Access Control Information Data Security Saving Money Business Bitcoin Conferencing Tech Terms Document Management Network Mobile Devices Data Breach Bandwidth Alert Patch Management Apps Vulnerability Disaster Recovery Google Maps Social Engineering Internet of Things Microsoft Office Hacking Remote Monitoring Scam Update Vulnerabilities Data loss Saving Time Managed IT services Facebook Gmail Automation Holiday Websites Vendor Smartphones Workplace Tips Social Media Desktop Monitoring Networking Compliance IT Spam Startup Going Green Microchip Operating System Travel Cortana Mobility email scam HTML Proxy Server Windows 10 Machine Learning News Mobile Technology WiFi Digital Multi-factor Authentication Sports Paperless Office Customer Resource management Television project management Piracy Entertainment VoIP Bluetooth Management Business Continuity Google Docs Business Cards Regulations Support Download Managed Service Provider Unified Communications Processor Username Disaster eWaste VPN Help Desk Microsoft Network Management Audit Fake News Virtual Reality Virtual Assistant Device security Augmented Reality Database Telephone System Mouse Money Software License Data Analysis Wireless Headphones Content Excel Antivirus Chromebook Computing CIO Upload Printing Navigation Fuse Networks Emergency IT Management Robot Data Protection Vendor Management Accountants Encryption Microsoft Excel Company Culture User Tip Productivity Tactics Electronic Medical Records Fileless Malware Cleaning BYOD Tip of the week Backup and Disaster Recovery Error Bookmark Gadgets Budget Legislation Trends Government Outsourced IT App Training Computer Care Identity Theft Computers Virtualization Hard Drive Big Data Addiction Cloud Computing Distributed Denial of Service Information Technology Directions Managed IT Services Mobile Security Health IT Website Telephone Comparison Browsers Users Apple Gamification Legal Evernote Miscellaneous Screen Reader Knowledge Google Calendar Computing Infrastructure Devices NCSAM Equifax Service Level Agreement Cryptocurrency Laptop Nanotechnology Downloads Hard Drive Disposal Analytics Freedom of Information Cost Printer Social Network Specifications SharePoint Downtime Emails Law Enforcement Wireless Public Speaking Managing Stress Presentation Wi-Fi Lithium-ion battery Multi-Factor Security Hiring/Firing Quick Tips Wireless Technology 5G Tech Support Safety IBM Fun Employer-Employee Relationship The Internet of Things Marketing Hacker Competition Customer Relationship Management Printers IP Address Twitter Hard Drives Regulation Customer Service Search Mobile Office Server Upgrade Domains Windows 10 Hosted Solutions