Mavericks Blogs

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Tech Term Privacy User Tips Hosted Solutions Business Computing Data recovery Mobile Devices Data Network Security Productivity Email Data Backup Cloud Innovation Google Cloud Computing Communications Smartphone Internet Internet of Things Malware IT Services Workplace Tips Hardware Smartphones IT Support Artificial Intelligence VoIp Router Mobile Device Hackers Communication BDR Business Backup Applications Windows 10 Network Outsourced IT Information Saving Money Browser Managed Service Android Managed IT Services Miscellaneous Holiday Chrome Microsoft Connectivity Gadgets Windows Small Business Data Protection Efficiency Business Management Encryption Computer VPN Human Resources Money Paperless Office Blockchain Settings Sports Automation Infrastructure Voice over Internet Protocol Business Continuity Passwords Identity Theft Business Intelligence Access Control Vulnerability Servers Virtual Assistant Machine Learning Word Password Cybercrime Fraud Save Money Software as a Service Keyboard Facebook Server Social Engineering Office 365 CES How To Cybersecurity Telephone System Disaster Recovery Computers Comparison Content Management Two-factor Authentication Managed IT services Recycling Google Docs Charger Nanotechnology Cortana Private Cloud Telephone Systems Safe Mode Microsoft Office Apps Bing Specifications Smartwatch IT Management Addiction Cleaning Training Display Workforce Networking Software Amazon Web Services Wireless Internet eWaste Disaster Recovery Systems Organizations today Shortcuts Wireless Charging Smart Tech Google Apps IT Plan Save Time Big Data Data Security Help Desk Entertainment HIPAA Mobile Computing Health Telecommuting Practices Smart Office Remote Worker Accountants Security Cameras Managed IT Enterprise Content Management Digital Signature Administrator Upgrade MSP data-driven marketplace Telephony Staff Scam Proactive IT Credit Cards Business Mangement BYOD Spam Authentication Electronic Medical Records Employee Remote Work Online Shopping Wiring Wi-Fi Law Enforcement Password Management PDF WiFi Windows 7 File Sharing top-line performance Mobility Devices Employer-Employee Relationship HVAC Virtualization Warranty Bring Your Own Device Website Mobile Device Management Remote Monitoring Digital Signage OneNote Hosted Computing Firewall Phishing Hacker Password Manager NIST Update Microchip USB Legal Social Media business intelligence Social Work/Life Balance Collaboration Workers Printer Cache Gmail Google Drive Bandwidth YouTube Data Management Camera Google Search Search Engine Evernote Inventory Document Management Unified Threat Management Ransomware Botnet Cryptocurrency Wire Criminal Augmented Reality organizations need Vendor Millennials Thought Leadership Alert Mouse Amazon Company Culture Printers Thank You Managing Stress Congratulations Compliance Quick Tips Net Neutrality Regulation ISP Twitter