Mavericks Blogs

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Tech Term Privacy Email Network Security Innovation Data recovery Internet Internet of Things Data Malware Cloud Computing Cloud Business Computing Mobile Devices Data Backup Artificial Intelligence Applications Saving Money Hosted Solutions Workplace Tips Hardware Android Smartphones Hackers Smartphone BDR User Tips Backup Connectivity Windows VoIp Small Business Google Network Outsourced IT Data Protection Communications IT Services Two-factor Authentication Comparison Business Management Encryption Managed IT services Content Management Browser VPN Money Blockchain Infrastructure Router Passwords Identity Theft Paperless Office Business Intelligence Sports Information Vulnerability Microsoft Communication IT Support Gadgets Windows 10 Managed Service Password Virtual Assistant Cybercrime How To Social Engineering CES Miscellaneous Save Money Facebook Computers MSP NIST Gmail Efficiency Hosted Computing Office 365 Evernote Data Management Millennials Cybersecurity USB Amazon Ransomware Collaboration Alert Wiring Cache Telephone System Telephone Systems Criminal organizations need Bandwidth YouTube Charger Human Resources File Sharing Cryptocurrency IT Management Recycling Inventory Document Management Specifications Cortana Workforce Apps Server Productivity Wire Amazon Web Services Thought Leadership Computer Software Firewall Nanotechnology Wireless Charging Google Apps IT Plan Social Media Addiction Safe Mode Telecommuting eWaste Disaster Recovery Systems Organizations today Mobile Device Big Data Data Security Cleaning Holiday HIPAA Automation Networking Digital Signature Unified Threat Management Wireless Internet Credit Cards Accountants Smart Tech Chrome Business Staff Augmented Reality Remote Work data-driven marketplace Access Control Entertainment Managed IT Enterprise Content Management Business Mangement BYOD Practices Smart Office Online Shopping Electronic Medical Records PDF Settings Upgrade Bring Your Own Device Fraud Microsoft Office Servers Employer-Employee Relationship Virtualization Training top-line performance Authentication Machine Learning Keyboard Law Enforcement Password Management Mobile Device Management Word OneNote Remote Monitoring Managed IT Services Password Manager Update Mobile Computing Windows 7 Phishing Devices HVAC Work/Life Balance Workers Remote Worker Website Legal business intelligence Disaster Recovery Quick Tips Compliance Twitter Thank You Regulation Company Culture Congratulations Camera Managing Stress Printers