Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 08 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Cybersecurity Communication Smartphone Managed Service Data Backup Android Upgrade VoIP Data Recovery AI Business Management Smartphones Mobile Devices Disaster Recovery communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Tech Term Network Internet of Things Remote Information Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Blockchain Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Apps Data Security Mobile Office Vendor Two-factor Authentication Employer-Employee Relationship Managed Services Voice over Internet Protocol Apple Networking App Mobile Device Management BYOD Gmail Chrome Budget Tip of the week Conferencing Hacker How To Avoiding Downtime BDR Marketing Computing Information Technology HIPAA Applications Office 365 WiFi Access Control Storage Password Retail Bring Your Own Device Healthcare Computers Managed IT Services Website Operating System Risk Management Router Virtual Private Network Analytics Office Tips Health Big Data Augmented Reality 2FA Help Desk Document Management Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Going Green Project Management Windows 7 Patch Management Save Money Microsoft 365 Cybercrime Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Physical Security Display The Internet of Things Printer Windows 11 Paperless Office Infrastructure Social Monitoring Excel Professional Services Saving Time Virtual Machines Sports Customer Relationship Management Mouse Managed IT Service Maintenance Administration Antivirus Downloads Hacking iPhone Presentation Licensing Vulnerabilities Wireless Technology Entertainment Data Privacy Images 101 Settings Wireless Printing Telephone System Content Filtering Multi-Factor Authentication Robot Mobility Cost Management Word YouTube Cryptocurrency IT Management VPN Employees Meetings Integration Virtual Desktop Safety Data storage LiFi User Tip Modem Computer Repair Mobile Security Processor Outlook Holidays Money Data Storage Smart Technology Supply Chain Humor Video Conferencing Machine Learning Managed Services Provider Writing Distributed Denial of Service Workplace Deep Learning Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Education Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Competition Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Mobile Computing Financial Data Search Error History Business Communications Social Engineering Break Fix Scams Best Practice Browsers Smartwatch Connectivity IT Buisness Upload Procurement Remote Computing Azure Hybrid Work User Legal IT solutions Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Business Growth CES Tablet IoT Communitications Trends Supply Chain Management Alert IP Address Managed IT Customer Resource management FinTech Cortana File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Alt Codes Data Analysis Star Wars IT Assessment Downtime Gamification Flexibility Notifications Staff Value Business Intelligence Recovery Hard Drives Hosted Solution Organization Travel Social Networking Legislation Shortcuts Google Maps Smart Devices Ransmoware Domains Typing Techology Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Refrigeration Google Drive Health IT Knowledge Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Public Speaking Unified Threat Management Directions Videos 5G Wasting Time Threats Lithium-ion battery Network Congestion Specifications Security Cameras Workplace Strategies Entrepreneur Google Docs Unified Communications Experience Trend Micro Running Cable Internet Exlporer Software as a Service Fraud Meta Bitcoin User Error Microchip Google Wallet Username Managing Costs Amazon Black Friday SSID Undo Point of Sale eCommerce Laptop Database Surveillance Virtual Assistant Outsource IT Windows 8 Drones Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Proxy Server Reviews Cookies Halloween Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Application PowerPoint Shopping Nanotechnology Optimization Scary Stories Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing IBM Hacks SharePoint Management PCI DSS Fun Chatbots Navigation

Blog Archive