Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Computer Google Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android VoIP Business Management Smartphones Productivity Upgrade Mobile Devices communications Data Recovery Disaster Recovery Browser Social Media Windows Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Information Covid-19 Holiday Remote Work Training Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 Government IT Support Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Tip of the week Managed Services Gmail Voice over Internet Protocol WiFi How To BDR Computing Information Technology HIPAA Hacker Applications Avoiding Downtime Office 365 Access Control Marketing Conferencing Healthcare Big Data Managed IT Services Operating System Risk Management Router Computers Virtual Private Network Analytics Website Office Tips Health Augmented Reality 2FA Help Desk Storage Password Bring Your Own Device Retail Telephone Scam The Internet of Things Data loss Social Going Green Cooperation Free Resource Project Management Windows 7 Patch Management Cybercrime Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Solutions Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Safety Maintenance Downloads Antivirus Administration iPhone Licensing Entertainment Vulnerabilities Data Privacy Images 101 Settings Printing Wireless Multi-Factor Authentication Content Filtering Robot Mobility Telephone System Customer Relationship Management Cost Management YouTube Cryptocurrency IT Management Hacking VPN Employees Presentation Meetings Integration Virtual Desktop User Tip LiFi Wireless Technology Modem Data storage Processor Computer Repair Mobile Security Holidays Outlook Money Data Storage Word Smart Technology Supply Chain Humor Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Sports Mouse Managed IT Service Mobile Computing Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Search Business Communications Financial Data Undo Browsers Smartwatch Best Practice Connectivity IT Social Engineering Break Fix Scams Upload Procurement Buisness Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Legal Social Network Telework IT solutions CES Business Growth Tablet IoT Communitications Dark Web Cables Trends Supply Chain Management Application Alert File Sharing Regulations Cortana Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Data Analysis Alt Codes IBM Star Wars IT Assessment How To Microsoft Excel IT Maintenance Gamification Flexibility Downtime Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Hosted Solution Techology Fileless Malware Digital Security Cameras Typing Google Maps Smart Devices Ransmoware Content Remote Working Wearable Technology Memory Vendors Competition Unified Threat Management Motherboard Data Breach Knowledge Comparison Google Play Be Proactive Google Drive Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce 5G Wasting Time Threats Unified Communications Trend Micro Experience Network Congestion Specifications Security Cameras Workplace Strategies Google Docs User Error Microchip Bitcoin Internet Exlporer Software as a Service Running Cable User Fraud Meta Managing Costs Amazon Google Wallet Username Point of Sale eCommerce Black Friday SSID Windows 8 IP Address Database Surveillance Laptop Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Drones Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Halloween Recovery Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Hard Drives Shopping Domains Nanotechnology Optimization PowerPoint SharePoint Hacks Addiction Scary Stories Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Fun Navigation Management PCI DSS Refrigeration Lenovo Gig Economy Deep Learning Public Speaking Screen Reader Writing Distributed Denial of Service Workplace Lithium-ion battery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Entrepreneur Evernote Paperless Server Management Regulations Compliance Education Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT

Blog Archive