ComputersSoftware

"You need permission to perform this operation": what to do?

When performing certain actions from the operating system, you may receive a notification that you need to get access to perform the task in the form of a system message "you need permission to perform this operation." Separately it is necessary to consider if the request was made from a simple user, and separately - the administrator of the computer. But how does it happen that an administrator needs access, if he is already the most important?

What is file access?

In order to be able to somehow influence a particular file, you first need to access it. As a rule, access is established simultaneously with logging on as a user with certain rights. But there may be exceptions when access to a file or a group of files has been deliberately limited by additional software. In fact - access to the file indicates the ability to perform certain manipulations. If the computer says that you need permission to perform an operation to start it, it means that for certain reasons you were limited in use. And if you tried to run something that you have no idea about and for the first time see, most likely it's a program file, and you do not need to touch it.

Why is it installed?

The fact is that there are quite a lot of malicious files, as well as files that are important for the full operation of the operating system. And in order for the user to accidentally disable the electronics, and apply a restriction. The possibilities to do much harm are like installing programs downloaded from the Internet, changing or deleting files that are important for the system. So, when you try to edit the system files, you will see the message "you need permission to perform this operation". System32, Windows or Program Files (in some cases) are those folders when you try to run files in which you could see such a message. And believe me, protection here is not in vain, if not for it, however many people would be compelled to turn to repair services or electronics stores to purchase new personal computers.

Different types of users in operating systems

Before talking, there are 3 main types of users with which modern standard universal personal computers work: administrators, ordinary users and guests. The difference between them is this:

  1. Administrators. Users with the highest level of access. They can easily install various programs, make changes to their functioning and delete them. Among them are the most senior administrator and others. The presence of the chief administrator is necessary for performing certain actions, although otherwise they are equivalent. Confirmation is the situation when an "ordinary" administrator can remove the principal. Separately, it is worthwhile to talk about system files - for access to them, even the administrator should first perform a series of actions, but people with sufficient qualifications know what to do, and those who do not know it is better not to report, this is fraught with negative consequences until the hardware breaks down. But if you do not take into account the system files, then for these users see the message "you need permission to perform this operation, Windows 7 has limited your access" - a rare event.
  2. Ordinary users. They support the creation of additional files within individual programs, but with their help you can not install or remove the programs themselves. An example is the availability of office software and the creation of separate files for their own needs.
  3. Guests. Limited users who have very few basic rights (but they can be extended or even trimmed). The category is used to provide access to people who need a computer for a while or for a narrow range of activities.

How to access?

The easiest option is to change the user type. Individual programs require running with administrator rights. In such cases, it is necessary to log in properly, click on the icon with the right mouse button and select "Run as administrator".

But there is a restriction with the help of special programs. If they do not close with a password, but simply restrict access, then you can solve this problem. It is necessary to find the program with which the access was closed, and open it. Access to information that is closed by a password is difficult without knowing its meaning.

How to access system files? Attention! If you do not know what and how, do not meddle with them, this is fraught with problems in the computer's efficiency and financial expenses for restoration. To display the system files, select the folder properties in the toolbar, there you can find a list on the "View" tab and check the "Show system files" checkbox. They will be available for editing and deletion. But once again, if you do not understand and do not have the information support of a professional, do not touch anything.

Startup Limit

A bit more detail should be given to the restrictions regarding the launch of programs. The fact is that some programs require access to the computer program register or may have potentially unsafe components. In the case of the first variant, in order to avoid clogging the registers and, consequently, the speed of the computer, a similar restriction is introduced. Also, the message "you need permission to perform this operation" can serve as an indicator of the importance of the program and its actions, so the control of an experienced person (which by default is considered an administrator) is necessary. The second option is possible in cases where everything is done to avoid the possibility of the user installing the software of suspicious content, under which everything falls, downloaded from the Internet.

Restriction for removal

Now regarding the messages "you need permission to perform this operation when deleting". Why was such a mechanism installed? This is done for the impossibility of deleting programs written in the computer. Completely remove the software components can only user with administrator rights. A simple move to the basket and its cleaning are not guarantees that the object is no longer there. With the help of special software, remote information can be restored (here, however, there are a number of nuances, but this is a topic for a separate article).

Conclusion

So, the article considered what to do when there is no access to certain files, what could be the reasons for this. Next, you should direct all your efforts in a certain direction and do all that is necessary.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.unansea.com. Theme powered by WordPress.