Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Smartphones Data Recovery VoIP Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Operating System Router Virtual Private Network Risk Management Computers 2FA Health Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Going Green Patch Management Social Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Physical Security Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Free Resource Project Management The Internet of Things Cooperation Windows 7 Microsoft 365 Telephone System Robot Cost Management Settings Printing Wireless Employees Content Filtering Integration IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Processor Holidays Presentation Computer Repair Mobile Security Data Storage Virtual Desktop Data storage LiFi Wireless Technology Supply Chain Video Conferencing Managed Services Provider Smart Technology Outlook Virtual Machines Professional Services Machine Learning Money Saving Time Humor Word Managed IT Service Maintenance iPhone Sports Downloads Antivirus Mouse Licensing Vulnerabilities Safety Data Privacy Entertainment Administration Images 101 Multi-Factor Authentication Mobility Remote Working Travel Social Networking Memory Vendors Application Legislation Techology Fileless Malware Google Maps Data Breach Cortana Google Play Be Proactive Wearable Technology Workforce Videos Alt Codes Content Electronic Health Records IBM Health IT Downtime Unified Threat Management Motherboard Wasting Time Threats Comparison Unified Threat Management Directions Hosted Solution Assessment Trend Micro Permissions Security Cameras Workplace Strategies Meta Typing Software as a Service Managing Costs Amazon Network Congestion Specifications Google Drive User Error Microchip Internet Exlporer eCommerce Competition Knowledge Fraud SSID Virtual Assistant Outsource IT Username Surveillance Point of Sale Virtual Machine Environment 5G Black Friday Media Google Docs Reviews Unified Communications Database Experience Medical IT Running Cable Tech Support IT Technicians Transportation Small Businesses User Bitcoin Network Management Development Google Wallet Proxy Server Cookies Hypervisor Displays Monitors Cyber Monday Shopping Tactics Optimization Hotspot PowerPoint Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Windows 8 IP Address Drones PCI DSS Nanotechnology Navigation SharePoint Gig Economy Addiction Electronic Medical Records Language Workplace Halloween Chatbots Teamwork Hiring/Firing Recovery Management Internet Service Provider Lenovo Regulations Compliance Screen Reader Hard Drives Writing Distributed Denial of Service Evernote Paperless Service Level Agreement Memes Domains Virtual Reality Computing Infrastructure Co-managed IT Scary Stories Private Cloud Identity SQL Server Technology Care Hacks Server Management Net Neutrality Superfish Bookmark Financial Data Identity Theft Smart Tech History Refrigeration Fun Business Communications Smartwatch Deep Learning Download IT Public Speaking Twitter Alerts Scams Error Azure Hybrid Work Procurement Lithium-ion battery Browsers Telework Education Connectivity Cyber security Social Engineering Break Fix Tech Human Resources Entrepreneur CES Upload Communitications Remote Computing Cables Multi-Factor Security Mobile Computing Social Network Supply Chain Management FinTech Tablet IoT Undo Search Dark Web Term Google Apps Best Practice Trends IT Assessment Alert IT Maintenance Flexibility Buisness File Sharing Regulations Value Business Intelligence Dark Data Google Calendar Managed IT Customer Resource management Legal Data Analysis Organization IT solutions Star Wars How To Microsoft Excel Shortcuts Ransmoware Digital Security Cameras Business Growth Gamification Smart Devices Notifications Staff

Blog Archive