Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Read-Only

Technology Basics: Read-Only

In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What is the significance of these files, and what does that marking really mean? That’s the topic we’ll explore below.

Reading into Read-Only
Read-only is an attribute that can be assigned to a stored file that prevents users from being able to do more than view its contents, including blocking their ability to modify them or delete them. Quite literally, the only thing a user can do is read them.

The read-only attribute can be commonly seen among important files, but other things can be assigned this attribute as well. A folder can be read-only, meaning that all of its contents cannot be altered unless the attribute is removed from the folder itself. External storage media, like flash drives and SD cards, can also be assigned this attribute. Looking back to the CD-ROM days, that acronym stood for Compact Disk Read-Only Memory, signifying that the data on the disk could be viewed, but not altered.

Why Are Things Marked This Way?
There are a few reasons why a file or folder will be marked as read-only. Most commonly, these files and folders will be the ones that you never see.

In order to function properly, a computer needs both its hardware and its software to be lined up, so to speak. This requires certain files to be in certain places, containing certain information. If any of this was to be altered, the system wouldn’t function properly.

To prevent users from accidentally disabling their computer by deleting the wrong thing, these critical files are marked as read-only, and are often hidden from view anyways.

However, you can also mark a file that you’ve created as read-only by accessing its properties. This may be handy if there is a file that you allow company-wide access to, but don’t want it to be modified, like your employee handbook or other key information. What other uses for a read-only file can you think of? Share them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 15 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Managed Service Cybersecurity Communication Data Backup Smartphone Android Data Recovery AI Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Covid-19 Cloud Computing Training Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Apps Data Security Vendor Mobile Office Two-factor Authentication Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Managed Services Tip of the week Voice over Internet Protocol Chrome WiFi Budget How To BDR HIPAA Hacker Applications Avoiding Downtime Computing Marketing Information Technology Access Control Office 365 Conferencing Managed IT Services Computers Router Operating System Website Risk Management Virtual Private Network 2FA Help Desk Health Analytics Office Tips Augmented Reality Healthcare Big Data Retail Storage Password Bring Your Own Device Windows 7 Microsoft 365 Customer Service Going Green Patch Management Solutions Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Display Monitoring Printer Paperless Office Firewall Infrastructure Excel Remote Workers Document Management The Internet of Things Telephone Social Scam Cooperation Free Resource Project Management Data loss Images 101 Administration Customer Relationship Management Telephone System Multi-Factor Authentication Mobility Cost Management Hacking Presentation Robot Employees Settings Wireless Technology Wireless Printing Integration Content Filtering User Tip Modem IT Management Mobile Security YouTube Meetings Processor VPN Holidays Cryptocurrency Word Data Storage Computer Repair Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage Managed Services Provider LiFi Saving Time Virtual Machines Professional Services Outlook Safety Managed IT Service Machine Learning Money Humor Downloads iPhone Licensing Maintenance Sports Entertainment Antivirus Vulnerabilities Mouse Data Privacy Data Analysis Star Wars IT Assessment Mobile Computing Microsoft Excel IT Maintenance Staff Value Business Intelligence Tablet Search Gamification Flexibility Organization Social Networking Best Practice Legislation Shortcuts Alert Buisness File Sharing Competition Dark Data Fileless Malware Digital Security Cameras Smart Devices Managed IT Ransmoware Legal Wearable Technology Memory Vendors IT solutions How To Content Remote Working Health IT Motherboard Data Breach Business Growth Comparison Google Play Be Proactive Notifications Travel Directions Videos Assessment Electronic Health Records Permissions Workforce Techology Wasting Time Threats Google Maps Cortana User Trend Micro Alt Codes Specifications Security Cameras Workplace Strategies Downtime Unified Threat Management Microchip Internet Exlporer Software as a Service Fraud Meta Username Unified Threat Management Managing Costs Amazon Hosted Solution IP Address eCommerce Typing Black Friday SSID Virtual Assistant Outsource IT Network Congestion Database Surveillance Google Drive User Error IT Technicians Virtual Machine Environment Media Knowledge Recovery Proxy Server Reviews Cookies Cyber Monday Medical IT Hard Drives Hotspot Transportation Small Businesses Point of Sale Domains 5G Tactics Development Google Docs Mirgation Hypervisor Displays Unified Communications Experience Shopping Nanotechnology Optimization Bitcoin Network Management PowerPoint Running Cable Tech Support Refrigeration Language Employer/Employee Relationships Outsourcing Public Speaking Monitors Addiction Google Wallet Management PCI DSS Chatbots Lithium-ion battery Navigation Entrepreneur Gig Economy Screen Reader Windows 8 Distributed Denial of Service Workplace Laptop Websites Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Drones Regulations Compliance SharePoint Identity Evernote Paperless Electronic Medical Records Bookmark Smart Tech Memes Co-managed IT Halloween Undo Alerts SQL Server Technology Care Writing Download Net Neutrality Lenovo Financial Data History Business Communications Virtual Reality Browsers Smartwatch Connectivity IT Hacks Server Management Break Fix Scams Scary Stories Private Cloud Superfish Azure Hybrid Work Identity Theft Fun Upload Procurement Social Network Telework Cyber security Deep Learning Multi-Factor Security Tech Human Resources Twitter Application Error CES IoT Communitications Dark Web Cables Education IBM Social Engineering Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Remote Computing

Blog Archive