crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Reading into Read-Only
Read-only is an attribute that is stored alongside the file that keeps users from doing more than just reading the contents. This attribute blocks users from changing or deleting the files, which might lead you to believe that “read-only” means that the file is extremely important.

Other files that aren’t necessarily important can also be assigned the read-only attribute. A folder could take advantage of read-only, preventing its contents from being altered unless the attribute is removed from the folder. External storage media can also use this attribute to keep others from messing around with your flash drives and SD cards. Even the CD-ROM, those relics of the past, took advantage of read-only technology (the acronym actually stands for Compact Disk Read-Only Memory), preventing users from overwriting the data stored on the disk.

Why Are Documents Marked This Way?
There are several reasons why a file or folder might be marked as read-only, but the primary one you’ll see is that these files or folders aren’t meant to be seen in the first place. These files are meant to be protected from being changed, as they are often critical files for a computer’s hardware and software. Certain files need to be in specific locations, as well as contain specific information. If the file is altered, the computer simply won’t work properly.

In essence, this functionality is programmed in so that users can’t accidentally disable their computers by deleting the wrong files. Besides, these files are more or less hidden from view anyway, meaning that users wouldn’t be able to delete them in the first place.

You can mark a file as read-only yourself as well, which you can do by accessing the properties. This could be helpful if your business wants to make a certain file available for all to see but without actually giving permissions to edit the file (like your employee handbook). What are some other uses you can think of for a read-only file? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 18 December 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Email Malware Backup Business Software Data Mobile Devices Hardware IT Support Small Business Network Communication Server Smartphones Upgrade VoIP Computer Business Continuity Mobile Device Management Innovation Google Windows Efficiency Data Backup Disaster Recovery Virtualization Microsoft Office Outsourced IT Tech Term Miscellaneous Mobile Office Holiday Vendor Management Network Security Social Media Productivity Gadgets User Tips Quick Tips Passwords BYOD Mobile Computing Android Smartphone Browser Internet of Things Data Recovery Managed IT services WiFi Bring Your Own Device Windows 10 Remote Monitoring The Internet of Things Operating System Ransomware Best Practice Users Spam Data Management Collaboration Save Money Trending Apple Remote Computing Artificial Intelligence Wireless Technology Alert Office Going Green Firewall Content Filtering Encryption Customer Relationship Management History Unified Threat Management Gmail Tech Support Analytics IT Solutions Lithium-ion Battery Facebook Information Technology Current Events IT Consultant IT Support Antivirus Managed IT Services Maintenance App Router Big Data Cloud Computing Managed IT Printer Humor Two-factor Authentication Saving Time Applications Avoiding Downtime Phishing Document Management Hard Drives Mobile Device Bandwidth Wi-Fi Paperless Office Windows 8 Employer-Employee Relationship Website Customer Service Phone System Healthcare Apps Application Automation Virus Office Tips Government Retail Compliance Fax Server IT service Digital Payment Chrome Outlook Health VPN Business Growth Risk Management Project Management Cybersecurity Marketing Hacking Excel Computers Downtime Administration Data Security Presentation Augmented Reality Budget Infrastructure Proactive IT Training Computer Repair Point of Sale Mouse Recovery Money Help Desk Vulnerability Information Net Neutrality Running Cable Social User Error Regulations Licensing Blockchain Co-Managed IT Managed Service BDR Wireless File Sharing Files PowerPoint Social Networking Tablet Office 365 Scam Unified Communications Password Inbound Marketing iPhone Windows 10 Recycling Computing eWaste Tip of the week Search Piracy Virtual Desktop USB Business Owner Sports Hacker User Programming Remote Workers Company Culture Analyitcs Twitter Education Specifications Safety Settings Data loss IBM HIPAA Cost Management Cybercrime Save Time Redundancy Wearable Technology Conferencing Flexibility Hosted Solution Hiring/Firing Alerts Machine Learning Display Data storage communications IT Management Internet Exlporer Storage Remote Monitoring and Management Statistics Mobility Smart Technology Robot Mobile Security Intranet Printing Competition IoT Business Intelligence End of Support LiFi Network Congestion Fleet Tracking Windows 8.1 Update Chatbots Features Sync Multi-Factor Security Public Speaking Cortana Best Available Star Wars Zero-Day Threat Software Tips Managed IT Service Monitors Language Virtual Reality Deep Learning Geography Asset Tracking Identity Electronic Health Records Mobile Device Managment Google Calendar Google Wallet Knowledge Environment Utility Computing Backup and Disaster Recovery Break Fix Writing Server Management Computing Infrastructure SaaS Techology High-Speed Internet Bluetooth OneNote Online Currency Samsung Cyberattacks Legislation Drones Social Engineering Experience Buisness Troubleshooting Debate Human Error Dark Web Cooperation Computer Accessories Chromebook Disaster Resistance Identities Heating/Cooling Development Employee-Employer Relationship Consumers Motherboard Crowdfunding Read Only G Suite Macro Backups CIO Hard Drive Permission Data Warehousing Patch Management Staff IT Consulting Solid State Drive Cables Modem Bookmarks Travel Software as a Service Legal IP Address Cache Test Microsoft Excel Gaming Console Operations Touchscreen Politics Data Breach Alt Codes Refrigeration Wires Disaster Cookies Favorites Meetings Technology Tips YouTube Management RMM Virtual Private Network Telephony Technology Laws Typing Digital Signature Nanotechnology Memory Instant Messaging Comparison Google Drive How To Laptop Enterprise Resource Planning Tech Terms How To Permissions IT Technicians Monitoring Unified Threat Management Cryptocurrency MSP Documents Screen Reader Finance Identity Theft Black Friday Google Docs Halloween Entrepreneur Mobile Theft Assessment Adminstration Fraud 3D Mirgation Consulting Access Control PC Care Bitcoin Undo Proactive PDF Smart Tech Value People Authentication Cyber Monday 5G Scary Stories Managing Stress Financial eBay Remote Support Managed Services Provider Private Cloud SharePoint Leadership Hacks Skype Connectivity Streaming Media Authorization New Additions Electronic Medical Records Business Technology Enterprise Content Management Print Server Network Management Text Messaging Migration Work Station E-Commerce Public Cloud Downloads Domains WPA3 Fun LinkedIn Employees Scheduling Distributed Denial of Service Congratulations Video Surveillance Networking Word Vulnerabilities Law Firm IT Hotspot

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...