Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Productivity Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade Data Recovery VoIP Business Management Smartphones AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Gadgets Cloud Computing Holiday Covid-19 Training Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Managed Services Gmail Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Computing Information Technology HIPAA Hacker Applications Access Control Analytics Website Office Tips 2FA Augmented Reality Help Desk Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Big Data Operating System Virtual Private Network Risk Management Router Computers Health Windows 11 Document Management Monitoring Excel Firewall Scam Remote Workers Data loss Telephone The Internet of Things Social Going Green Patch Management Cooperation Free Resource Project Management Save Money Remote Monitoring Windows 7 End of Support Vulnerability Vendor Management Microsoft 365 Cybercrime Physical Security Solutions Customer Service Display Printer Paperless Office Infrastructure Processor Mobile Security Outlook Holidays Machine Learning Money Data Storage Humor Smart Technology Supply Chain Word Video Conferencing Managed Services Provider Saving Time Virtual Machines Maintenance Professional Services Sports Antivirus Mouse Managed IT Service Safety Administration Downloads iPhone Licensing Entertainment Vulnerabilities Robot Data Privacy Images 101 Settings Wireless Printing Telephone System Multi-Factor Authentication Mobility Content Filtering Cost Management IT Management Customer Relationship Management YouTube Meetings VPN Cryptocurrency Hacking Employees Presentation Computer Repair Integration Virtual Desktop User Tip Data storage Modem LiFi Wireless Technology Laptop Websites Database Surveillance Windows 8 Virtual Assistant Outsource IT IP Address Drones IT Technicians Virtual Machine Environment Media Proxy Server Reviews SharePoint Cookies Cyber Monday Medical IT Electronic Medical Records Halloween Recovery Tactics Development Hotspot Transportation Small Businesses Lenovo Mirgation Hypervisor Displays Hard Drives Writing Shopping Nanotechnology Optimization PowerPoint Domains Virtual Reality Scary Stories Private Cloud Addiction Hacks Server Management Language Employer/Employee Relationships Outsourcing Superfish Chatbots Identity Theft Navigation Refrigeration Fun Management PCI DSS Gig Economy Screen Reader Deep Learning Distributed Denial of Service Workplace Public Speaking Twitter Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Identity Education Evernote Paperless Social Engineering Entrepreneur Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Remote Computing Download Net Neutrality Mobile Computing Alerts SQL Server Technology Care History Tablet Business Communications Undo Search Financial Data Browsers Smartwatch Connectivity IT Best Practice Break Fix Scams Alert Buisness File Sharing Dark Data Upload Procurement Managed IT Azure Hybrid Work Legal Cyber security IT solutions Multi-Factor Security Tech Human Resources How To Social Network Telework CES IoT Communitications Business Growth Dark Web Cables Notifications Travel Application Trends Supply Chain Management Techology Regulations Google Maps Google Calendar Term Google Apps Cortana Customer Resource management FinTech Data Analysis Star Wars IT Assessment Alt Codes Microsoft Excel IT Maintenance IBM Downtime Unified Threat Management Gamification Flexibility Staff Value Business Intelligence Organization Unified Threat Management Social Networking Hosted Solution Legislation Shortcuts Fileless Malware Digital Security Cameras Smart Devices Typing Ransmoware Wearable Technology Memory Vendors Network Congestion Content Remote Working Health IT Google Drive User Error Motherboard Data Breach Comparison Google Play Be Proactive Competition Knowledge Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Point of Sale 5G Google Docs Trend Micro Unified Communications Specifications Security Cameras Workplace Strategies Experience Running Cable Tech Support User Microchip Internet Exlporer Software as a Service Bitcoin Network Management Fraud Meta Google Wallet Managing Costs Amazon Monitors Username eCommerce Black Friday SSID

Blog Archive