ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 13 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Disaster Recovery Passwords Holiday IT Support Managed Service Browser Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Saving Money Government Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Gadgets Windows Blockchain App Virtualization Spam Server Information Remote WiFi Bandwidth Encryption Mobile Device Management Business Technology History Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget Gmail Health Conferencing Access Control Analytics Data Security Cybercrime Wi-Fi BDR Big Data Help Desk Training Employer-Employee Relationship Hacking Cost Management Document Management Remote Computing Hacker Patch Management Save Money Vendor Remote Monitoring Compliance Voice over Internet Protocol IT Management Best Practice Data loss Retail Alert Legal Hiring/Firing Data storage Outlook Money Password Customer Service Applications Unified Threat Management Firewall Project Management Vulnerabilities Augmented Reality Word BYOD IBM Mobile Office Website Computing Search... Vendor Management Hard Drive Managed Services Scam Storage The Internet of Things YouTube How To Twitter VPN Law Enforcement Laptop End of Support Update Printer User Data Breach Paperless Office Sports Travel Antivirus Social Chrome SaaS DDoS Virtual Reality Social Engineering Maintenance Cryptocurrency Black Market Windows 11 Monitoring iPhone Cleaning Education Cortana Mobile Computing Robot Healthcare Websites Content Filtering Remote Workers Marketing Meetings Mobility Router Windows 7 Running Cable Free Resource Google Maps Drones Chromebook Current Events Automobile Excel Solutions How To Integration Tech Terms Images 101 Wireless Technology Microchip Flexibility Display eWaste Managed IT Virtual Assistant HIPAA Digital Downtime Hack Employees Safety Identity Theft Taxes Avoiding Downtime Notifications Unified Communications Virtual Desktop Holidays Google Docs Processor Experience Bluetooth Cooperation Distributed Denial of Service Video Conferencing Office Tips Physical Security Private Cloud Memory Virtual Machines PowerPoint Disaster Computer Repair Administration Multi-factor Authentication Professional Services Start Menu Presentation Politics Computer Care Downloads Specifications Machine Learning Settings Lithium-ion battery IT Consultant Vulnerability Saving Time Solid State Drive Software as a Service Managed Services Provider Bitcoin Customer Relationship Management Processors Data Protection Computers Virtual Private Network Co-Managed IT Entertainment Telephone Motion Sickness Microsoft 365 Cables Browsers Smartwatch Nanotechnology Communitications Reading Google Drive Upload Procurement Monitors Software License Visible Light Communication Comparison Google Play Social Network FinTech Windows 8 Point of Sale Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Relocation Telephony Trends Supply Chain Management Public Speaking Displays Employer Employee Relationship Mobile Technology Value Advertising Television Security Cameras Streaming Media Customer Resource management Organization Work/Life Balance Cabling Devices Cyber security Tech Support Shortcuts Keyboard G Suite Tip of the week Fileless Malware Tablet Smart Devices Troubleshooting VoIP Gamification Remote Working Hard Drives Tracking Company Culture Mouse In Internet of Things Telephone System AI Regulations Trend Micro intranet Be Proactive Shortcut Network Congestion Web Server Transportation Directions Digital Security Cameras Wireless Hacks Backup and Disaster Recovery Electronic Health Records Reliable Computing Content Heating/Cooling Writing Digital Payment Desktop Wasting Time Environment SharePoint Windows XP Electronic Medical Records Worker Accountants eCommerce Social Networking Modem Workplace Strategies Videos Access Database Surveillance Business Owner Scalability Time Management Public Cloud Managing Costs Administrator Health IT Text Messaging Equifax Proactive IT SSID Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Audit Media Bring Your Own Device Username File Sharing Virtual Machine Freedom of Information Smart Technology Redundancy Reviews Startup Optimization Music Staffing Cache Addiction email scam Teamwork Navigation 2FA Inbound Marketing Unified Threat Management Data Storage IP Address Workers Mobile Security Hypervisor News Medical IT Botnet User Tip Shopping Legislation Rental Service Network Management Micrsooft CCTV SQL Server Printing Evernote Paperless Touchscreen PCI DSS Flash Licensing Business Growth Computer Malfunction Fake News Supply Chain Electronic Payment Emergency Proxy Server Gig Economy Telephone Systems Emails Humor Recovery Vendor Mangement Service Level Agreement Internet Service Provider Competition Computing Infrastructure Azure Business Communications Management Regulations Compliance Samsung Device security Managed IT Service Entrepreneur Google Wallet Webcam Microsoft Excel Workplace LiFi Phone System Banking Uninterrupted Power Supply Wireless Headphones Memes Documents Messenger Business Mangement Going Green Net Neutrality Application Deep Learning Business Cards Tech Human Resources Error Financial Data Tablets Business Intelligence Hosted Solution Scams Bookmark Risk Management Business Metrics IT Securty Books Download Supercomputer Piracy Google Calendar Term Google Apps Virus Telework Computer Accessories Domains Language HTML Society

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?