Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Business Computing Google Malware Hosted Solutions Backup Microsoft Software Internet Windows 10 Innovation Network Security Data User Tips Smartphones Mobile Devices Business Email Browser Hardware Efficiency Tech Term VoIP Productivity Computer Business Continuity Disaster Recovery Data Backup Workplace Tips Ransomware Miscellaneous Android Smartphone IT Services Cybercrime Business Management communications Office Chrome Data Recovery Cloud Computing Alert Windows Productivity Outsourced IT Network Automation Save Money Upgrade Server Telephone Systems Managed IT Services Computers Managed IT Services Internet of Things Communication Money Social Media Virtualization Law Enforcement Small Business Artificial Intelligence Facebook Quick Tips Collaboration Office Tips Passwords App Applications Windows 10 Spam IT Support Password Social Engineering Office 365 Health Router How To Cybersecurity History Word Remote Computing Holiday Work/Life Balance Information Wi-Fi Google Drive Two-factor Authentication Bandwidth Gadgets Bring Your Own Device Gmail BDR Operating System Mobile Device Management Data Breach Mouse Managed Service Provider Entertainment HaaS Marketing Data Security Hacking Networking Phishing Encryption Sports Flexibility Data Management Application Safety Microsoft Office Voice over Internet Protocol Recovery VPN Scam Vulnerability Managed Service Data Protection Apps Connectivity Keyboard Settings Private Cloud Mobile Device Avoiding Downtime Mobile Computing Best Practice Government Comparison Retail DDoS Firewall Employer-Employee Relationship Robot IT Management Google Docs Public Cloud Spam Blocking User Error Software as a Service Downtime Hiring/Firing IT Support Human Resources Physical Security IT Plan Website Patch Management Telephony Servers Remote Monitoring Wearable Technology Cleaning USB End of Support Windows 7 Budget Data storage Business Intelligence Managed IT Training Unsupported Software Identity Theft PDF CES Update Infrastructure Paperless Office Mobility OneNote Saving Money Virtual Assistant Meetings YouTube Content Management Big Data Redundancy Legal Telephone System eWaste Battery Black Market Electronic Medical Records Blockchain Charger BYOD Fraud The Internet of Things Data Storage Internet Exlporer Root Cause Analysis Accountants Environment Experience Files Education Help Desk Tip of the week Telecommuting Cortana Wire Save Time HIPAA NIST Audiobook SaaS Search Printer Amazon Thought Leadership NarrowBand Laptop Wireless Computer Fan Worker Video Games Wiring Maintenance Authentication Emergency Knowledge Recycling Uninterrupted Power Supply Music Automobile Computing Infrastructure Windows Server 2008 Google Apps Smart Office Cryptocurrency People How to Administrator HBO Specifications Amazon Web Services Distributed Denial of Service Wireless Technology Touchpad Smart Technology FENG Value Rootkit Scalability Unified Threat Management Remote Work Nanotechnology Hybrid Cloud Network Congestion Windows 10s Social Criminal Data loss Programming Biometrics Practices IBM Shortcuts Workers Document Management Employer Employee Relationship Netflix MSP Customer Relationship Management Staff Safe Mode Mobile Office Risk Management Apple Assessment Microchip Outlook Online Shopping Addiction Chromecast Two Factor Authentication webinar Notifications Instant Messaging Camera Smart Tech IT Consultant Skype HVAC Screen Mirroring Hosted Computing Tech Support Troubleshooting Internet exploMicrosoft Supercomputer Users Flash Monitor Computer Accessories File Sharing Botnet Customer Service Politics iPhone Television Search Engine Frequently Asked Questions Millennials Evernote Cache Conferencing Enterprise Content Management Relocation Vendor Management Software Tips Multi-Factor Security Shortcut Credit Cards Transportation Information Technology Samsung Solid State Drive Start Menu Social Networking Augmented Reality Cast Computer Care Inventory Running Cable Shadow IT Advertising Virtual Reality Password Manager Machine Learning Reputation Bluetooth Travel Fax Server Digital Signature Public Computer Bing Excel Workforce IT solutions Wireless Charging Wireless Internet Streaming Media Techology Emails Password Management Content Humor Warranty Trending Devices Going Green Benefits Leadership Audit Tools Remote Worker WiFi Access Control Books Current Events Worker Commute Sync Business Mangement Lithium-ion battery Customers Compliance Webinar Thank You Managing Stress Regulation IT solutions Twitter Congratulations Printers CrashOverride Company Culture
QR-Code