Mavericks Blogs

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, November 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Tech Term Privacy Data recovery Email Data Innovation Network Security Internet Data Backup Malware Workplace Tips Communications Mobile Devices Hardware Internet of Things Cloud User Tips Cloud Computing Business Computing Saving Money Hackers Applications Smartphones Network IT Services BDR Hosted Solutions Google Artificial Intelligence Information VoIp Browser Communication Miscellaneous Android Connectivity Business Smartphone Backup Chrome Data Protection Windows 10 Windows Productivity Business Management Computer Small Business Outsourced IT Blockchain Sports Computers Money Two-factor Authentication Comparison Managed IT Services Infrastructure IT Support Managed IT services Vulnerability Servers Virtual Assistant Passwords Identity Theft Business Intelligence Password Cybercrime Save Money Facebook Server Microsoft CES Telephone System Gadgets Fraud Content Management Keyboard Encryption How To Router Social Engineering Managed Service Paperless Office VPN Voice over Internet Protocol Cleaning Disaster Recovery Training Apps Automation Networking Business Continuity Wireless Internet Evernote Software Smart Tech Amazon Google Apps IT Plan Access Control Entertainment Millennials Mobile Computing eWaste Disaster Recovery Systems Organizations today Managed IT Enterprise Content Management Telephone Systems Administrator HIPAA Practices Smart Office Remote Worker Charger Big Data Data Security IT Management Scam Accountants Upgrade Specifications MSP Digital Signature data-driven marketplace Amazon Web Services Staff Authentication Machine Learning Workforce Law Enforcement Password Management WiFi Electronic Medical Records Word Wiring Wireless Charging Business Mangement BYOD Telecommuting Warranty Windows 7 File Sharing PDF Devices HVAC top-line performance Website Holiday Employer-Employee Relationship Virtualization NIST Credit Cards Microchip Remote Monitoring Hosted Computing Office 365 Firewall Mobile Device Management Remote Work Printer Phishing Cybersecurity USB Social Media Password Manager Update Collaboration Legal business intelligence Cache Online Shopping Workers Bandwidth YouTube Camera Cryptocurrency Bring Your Own Device Search Engine Data Management Inventory Document Management Unified Threat Management Gmail Efficiency Mouse Ransomware Wire Augmented Reality Thought Leadership Criminal organizations need OneNote Alert Nanotechnology Addiction Safe Mode Microsoft Office Bing Cortana Human Resources Mobile Device Work/Life Balance Settings Recycling Managing Stress Help Desk Compliance Thank You Quick Tips Regulation Congratulations Twitter Printers Company Culture