253.777.0763    Get SUPPORT

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

How a Data Backup Can Be Used, No Disaster Necessa...
The Internet of Things Gives Great Power to Our Ph...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Evernote Privacy Data Breach Google Docs Entertainment Google Drive Comparison Quick Tips Bring Your Own Device Network Employer-Employee Relationship Mobile Device Management Specifications Settings Business Intelligence Productivity Credit Cards Online Shopping Practices Holiday Content Management Internet of Things Innovation Backup Internet Managing Stress Spam Blocking Windows 7 Emergency Communications Spam Router Emails Cache Wireless Internet Servers Managed IT Services Inventory Data loss Addiction Website Windows 10 Small Business Passwords Email Conferencing FCC Meetings Virtualization Password Manager Safe Mode Network Security Business Management Law Enforcement Operating System Hosted Solutions Office 365 Health Identity Theft Voice over Internet Protocol Browser IT Services Unsupported Software Keyboard Best Practices Document Management Electronic Medical Records Blockchain User Error Microsoft CES Alert Server Social Engineering Infrastructure Data Backup Technology Hardware Hiring/Firing Tech Term Software Network Congestion Leadership VoIP Gadgets Fraud IT Plan Social Media Data Storage Communication Cleaning IT Management Smartphone Data Security Wi-Fi Start Menu Managed IT Services Company Culture Smart Tech Budget OneNote Microsoft Office Computers Save Money Tools Remote Monitoring Flash Apps Collaboration Human Resources Managed Service Provider NIST Criminal Redundancy HBO Private Cloud Cloud Windows Efficiency Computer Marketing VPN Public Cloud Malware Tip of the Week Phishing Data Mobile Devices Two-factor Authentication Ransomware Computer Care Excel Connectivity Smart Office Solid State Drive Facebook Windows 10 Artificial Intelligence Smartphones Data Protection Encryption Paperless Office Chrome Word Update Vulnerability Internet Exlporer Safety IT Consultant Big Data Data Management Hosted Computing eWaste Data Recovery Advertising Business Mangement HIPAA Business Computing Upgrade Avoiding Downtime Managed IT Security Travel Physical Security Cloud Computing Skype Saving Money Government Cybercrime App User Tips Nanotechnology Supercomputer Hackers Title II Business Continuity Productivity Cybersecurity Applications Automation Password Networking Google Money Outsourced IT Cortana How To BDR Telephone Systems IT Support IBM Online Cryptocurrency Android Samsung The Internet of Things BYOD Office Business Bandwidth

Newsletter Sign Up