253.777.0763    Get SUPPORT

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

How a Data Backup Can Be Used, No Disaster Necessa...
The Internet of Things Gives Great Power to Our Ph...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Word Software Efficiency Business Management Leadership Managed IT Services Credit Cards Malware Hardware Miscellaneous Sports Telephone System Encryption Cleaning Employer-Employee Relationship Data Security Windows 10 Data Recovery Computers Data loss Bandwidth Disaster Recovery Law Enforcement Hosted Solutions Human Resources Infrastructure Unsupported Software Business Continuity Connectivity Two-factor Authentication Business Managing Stress Microchip VoIP Company Culture Specifications Solid State Drive Business Mangement Content Management Data Protection HBO Business Computing Scam Apps Private Cloud Privacy Social Engineering Phishing Wireless Charging Data Evernote Cloud Computing Android Online Fraud Internet exploMicrosoft Office 365 Network Congestion Ransomware Facebook Administrator Gadgets Practices Remote Monitoring Start Menu Network Augmented Reality Smart Office iPhone HIPAA Microsoft Remote Worker Smartphones Communications Millennials How To Training Criminal Collaboration Cybersecurity BYOD Website IT Consultant Data Breach Automation Operating System Social Media Data Backup Internet Information CES Networking NIST Passwords Money Applications Bring Your Own Device Smartphone Mobile Devices Save Money Cybercrime Data Storage PDF Virtualization IT Services Server Government End of Support Identity Theft Computer Care Wi-Fi Password Flash Tools Flexibility Technology Camera Network Security Staff Title II Servers Managed IT Password Manager Hosted Computing Telephone Systems Microsoft Office Vulnerability Innovation Browser Twitter Computer Emails Relocation File Sharing Security App Alert Managed Service Document Management Comparison Update Productivity Hackers Virtual Assistant Paperless Office Chrome Outsourced IT Nanotechnology Communication Smart Tech Redundancy Windows 7 Addiction Mobile Device Management Keyboard Google Drive Voice over Internet Protocol Blockchain Search Engine IT Plan Windows 10 Managed IT Services Business Intelligence Router VPN Email Small Business Backup Tech Term IT Support Apple Humor IT Management Password Management Upgrade Samsung Best Practices Public Cloud Mobile Device Windows Saving Money Artificial Intelligence Internet of Things Spam Blocking HaaS Google Docs Supercomputer Cloud OneNote Workplace Tips Tip of the Week History Hybrid Cloud Settings BDR Avoiding Downtime Google Files Spam User Tips

Newsletter Sign Up