Contact us today!
(808) 529-4605

Indevtech Blog

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019

Captcha Image

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Malware Backup Internet Innovation User Tips Mobile Devices Network Security Microsoft Software Data Windows 10 Smartphones Efficiency Productivity Email Hardware Workplace Tips Business Browser VoIP Tech Term Productivity Computer communications Business Continuity Disaster Recovery Smartphone IT Services Data Backup Business Management Ransomware Miscellaneous Android Windows Cybercrime Network Cloud Computing Server Data Recovery Outsourced IT Office Chrome Automation Alert Artificial Intelligence Quick Tips Communication Telephone Systems Computers Managed IT Services Windows 10 Router Internet of Things Save Money Managed IT Services Upgrade Small Business Facebook Collaboration IT Support Health Cybersecurity Money Law Enforcement Social Media Virtualization Wi-Fi Spam Password Gadgets Social Engineering Office 365 Operating System Mobile Device Office Tips Passwords How To Holiday Applications App Work/Life Balance Word Google Drive Two-factor Authentication Bandwidth Bring Your Own Device Information Gmail BDR Mobile Device Management Private Cloud Settings History Remote Computing Phishing Encryption Application Safety Data Management Recovery Data Security VPN Mobility Apps Scam Microsoft Office Meetings Vulnerability Paperless Office Keyboard Voice over Internet Protocol Managed Service Mouse Managed Service Provider Data Protection HaaS Entertainment Connectivity Data Breach Hacking Marketing Networking Sports Flexibility Wearable Technology Cleaning Avoiding Downtime Patch Management Augmented Reality USB PDF Comparison Spam Blocking IT Management Google Docs Human Resources Cryptocurrency Saving Money Training Servers Telephony YouTube IT Plan Website Legal Battery Remote Monitoring Black Market Windows 7 eWaste Managed IT CES Big Data Identity Theft Business Intelligence Software as a Service Infrastructure The Internet of Things Unsupported Software Electronic Medical Records Charger Internet Exlporer Update Virtual Assistant Mobile Computing Government OneNote Retail Botnet Content Management Robot Machine Learning Public Cloud DDoS Save Time Best Practice Telephone System Firewall Employer-Employee Relationship Downtime IT Support Redundancy User Error Blockchain Fraud Social BYOD Access Control Hiring/Firing Physical Security End of Support Data Storage Budget Data storage Apple Root Cause Analysis HIPAA NIST Network Congestion Customer Relationship Management Tip of the week Amazon Telecommuting Thought Leadership Rootkit Display Mobile Office Computer Fan Recycling IBM Database Chromecast Authentication Employer Employee Relationship Netflix Bing Instant Messaging Google Apps Smart Office Risk Management Assessment Google Search Internet exploMicrosoft Users Two Factor Authentication webinar Warranty Monitor Notifications Security Cameras iPhone Tech Support IT Consultant Remote Worker Customer Service Windows Server 2008 Amazon Web Services FENG Shortcut Value Criminal Troubleshooting Supercomputer Business Technology Information Technology Social Networking HBO Remote Work Specifications Nanotechnology Computer Accessories Help Desk Relocation Windows 10s Workers Document Management Politics Television Proactive IT Advertising Virtual Reality Practices Conferencing Printer Reputation Vendor Management Hacker Running Cable Shadow IT Data loss IT solutions Staff Safe Mode Transportation Samsung Wiring Techology Fax Server Online Shopping Addiction Humor HVAC Biometric Security Going Green Streaming Media Outlook Smart Tech Bluetooth Skype Public Computer Net Neutrality Worker Commute Hosted Computing Emails Administrator Customers Cache Content Smartwatch Files Education Screen Mirroring Benefits Leadership Unified Threat Management Lithium-ion battery Flash Evernote Search Environment Enterprise Content Management Books Current Events MSP Laptop Wireless Frequently Asked Questions Credit Cards Millennials Shortcuts Solid State Drive Maintenance Start Menu Password Manager Experience ISP NarrowBand Software Tips Multi-Factor Security Inventory Microchip Video Games Wireless Charging Wireless Internet Audiobook SaaS Employee Computing Infrastructure Cast Computer Care Digital Signature Camera How to Uninterrupted Power Supply Travel Password Management Emergency Knowledge File Sharing Touchpad Excel Workforce Devices Worker Vendor Audit Tools Business Mangement Music Automobile Cryptomining Hybrid Cloud Distributed Denial of Service Wireless Technology Trending Search Engine Scalability People Biometrics Sync Cortana Wire Digital Signage WiFi Accountants Smart Technology Programming Managing Stress Regulation Twitter Thank You Webinar CrashOverride Congratulations Company Culture IT solutions Compliance Printers