Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Business Computing Malware Google Backup Microsoft Software Windows 10 Network Security Internet Innovation Smartphones Hosted Solutions Mobile Devices Email Data Tech Term Browser Hardware Productivity Efficiency Business Disaster Recovery VoIP User Tips Ransomware Business Continuity Cybercrime Android Computer Miscellaneous Office Business Management Smartphone IT Services Windows Alert communications Outsourced IT Automation Cloud Computing Save Money Computers Managed IT Services Data Backup Upgrade Workplace Tips Telephone Systems Network Chrome Social Media Virtualization Small Business Internet of Things Quick Tips Productivity Facebook Server Money Law Enforcement Collaboration Artificial Intelligence How To Password Office Tips Communication Passwords Router Data Recovery App Social Engineering Health Applications Managed IT Services Cybersecurity History Remote Computing Work/Life Balance Spam Two-factor Authentication Windows 10 Bandwidth Office 365 Bring Your Own Device Gadgets Gmail Operating System Wi-Fi Mobile Device Management Managed Service Provider Apps Entertainment Marketing Phishing Word Holiday Data Security Networking Sports Private Cloud Encryption Microsoft Office Application HaaS IT Support Recovery Data Management VPN Hacking Vulnerability Data Protection BDR Connectivity Flexibility Safety Google Drive Settings Data Breach Internet Exlporer Firewall Employer-Employee Relationship Mobile Computing Mouse Mobility BYOD Robot Retail Data Storage DDoS Hiring/Firing Avoiding Downtime Best Practice Legal Comparison Patch Management Battery Spam Blocking Black Market IT Management User Error USB Budget Mobile Device Cleaning Scam Information Training IT Plan Website Wearable Technology Government Windows 7 Remote Monitoring Business Intelligence Identity Theft Public Cloud Managed IT CES Managed Service Saving Money Infrastructure Paperless Office Downtime IT Support Unsupported Software Update Meetings Big Data Virtual Assistant YouTube Electronic Medical Records OneNote Content Management Keyboard Physical Security End of Support Charger Data storage Redundancy eWaste The Internet of Things PDF Blockchain Access Control Internet exploMicrosoft Users Audit Tools Lithium-ion battery Business Mangement Audiobook SaaS Monitor Trending Knowledge iPhone Sync Cortana Wire Worker Environment Accountants Emergency Relocation Tip of the week Telecommuting NarrowBand Amazon Thought Leadership Unified Threat Management Maintenance Information Technology Root Cause Analysis HIPAA Music NIST Automobile Authentication Smart Technology MSP Advertising Virtual Reality Computer Fan Recycling Reputation Network Congestion Google Apps Smart Office Rootkit Techology Google Docs Uninterrupted Power Supply Humor Windows Server 2008 Distributed Denial of Service Wireless Technology Amazon Web Services Employer Employee Relationship Netflix Camera Going Green People Human Resources Cryptocurrency IBM Social Remote Work Nanotechnology Two Factor Authentication webinar File Sharing Programming Biometrics Worker Commute FENG Value Criminal Risk Management Servers Assessment Customers HBO Specifications Practices IT Consultant Customer Relationship Management Files Education Windows 10s Telephony Workers Document Management Search Chromecast Online Shopping Addiction Computer Accessories Laptop Wireless Data loss Mobile Office Staff Troubleshooting Safe Mode Supercomputer Outlook Smart Tech Conferencing Augmented Reality Notifications Politics HVAC Television Video Games Tech Support Hosted Computing Transportation Samsung Customer Service Computing Infrastructure Skype Vendor Management Voice over Internet Protocol Social Networking How to Flash Evernote Cache Bluetooth Shortcut Touchpad Screen Mirroring Frequently Asked Questions Millennials Credit Cards Emails Remote Worker Hybrid Cloud Botnet Enterprise Content Management Public Computer Scalability Running Cable Shadow IT Inventory Benefits Leadership Fax Server Solid State Drive Start Menu Password Manager Content Machine Learning IT solutions Software Tips Multi-Factor Security Apple Streaming Media Wireless Charging Wireless Internet Cast Computer Care Digital Signature Books Telephone System Current Events Instant Messaging Excel Workforce Fraud Devices Save Time Wiring Travel Experience Password Management Company Culture Thank You WiFi Compliance IT solutions Managing Stress Regulation Congratulations Twitter Printers Webinar CrashOverride
QR-Code