facebook linkedin twitter

Technology Basics: Wizard

Technology Basics: Wizard

The word “wizard” may not seem to have much to do with computing, besides calling someone a “computer wiz.” However, there is a particular type of program that serves a very similar purpose, referred to as a wizard as well. We’ll examine it in today’s blog.

What a Wizard Does
Be honest - what first comes to mind when you hear the word “wizard?” Most likely, an old man with a beard, robes, and a pointy hat, waving a wand around and casting spells. These characters often serve as mentors, serving as a guide and a resource.

This is the same purpose that the wizard program serves on your computer. Like Dumbledore instructed Harry Potter and Gandalf pointed Frodo Baggins in the right direction, a software wizard walks a user, step-by-step, to the successful completion some task or goal. This goal is usually the installation and configuration of a program, or possibly running a scan.

What Makes a Wizard?
A software wizard typically breaks up whatever process it applies to into steps, each step represented by a separate page. This allows the wizard to ensure each step is properly completed before progressing with its task. Wizards will often also display progress bars and the like when a process will take some time.

Many wizards today go by different names, or have had their functions absorbed by other programs. Virtual assistants and office assistants both help users in a similar way, but many applications and online forms emulate wizards for the benefit of the user.

When was the last time you saw a wizard? Tell us in the comments!

BaaS Lets You Take Decentralization for a Test Dri...
Hackers Target Municipalities and Why That’s a Pro...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Workplace Tips Managed Service Provider Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services Efficiency IT Support Hosted Solutions Google Small Business Computer Smartphones User Tips Quick Tips Mobile Devices Gadgets Business Continuity Disaster Recovery Innovation Android Microsoft Office Mobile Office Virtualization Network Social Media VoIP Mobile Device Management Server Collaboration Data Backup Communication Smartphone Miscellaneous Ransomware Upgrade Windows 10 Tech Term IT Support Unified Threat Management Windows Data Recovery Operating System Remote Monitoring Passwords Productivity BYOD Remote Computing Holiday Managed IT services Vendor Management Mobile Computing Cybersecurity WiFi communications BDR Apps Facebook The Internet of Things Marketing Analytics Users Apple Phishing Automation Mobile Device Firewall History Alert Data Management Managed IT Services Outsourced IT Internet of Things Artificial Intelligence App IT Consultant Big data Browser Save Money Bandwidth Office Health Content Filtering Encryption Going Green Gmail Spam Bring Your Own Device Maintenance Antivirus Tech Support Virus Cost Management Managed IT Office 365 Information Technology Lithium-ion Battery Budget Best Practice Two-factor Authentication Windows 8 Outlook Hiring/Firing Help Desk Hard Drives Wireless Technology Cybercrime Search Printer VPN Hacking Travel Update Phone System Cloud Computing IBM Money Document Management Recovery Business Technology Employer-Employee Relationship Saving Time Training Computers Law Enforcement Intranet Windows 10 Compliance Education Hard Drive Data storage Risk Management Save Time Customer Service Access Control Legal Networking Regulations Website Government It Management SaaS Proactive IT Running Cable Humor Administration Password Cortana Securty Data Breach Twitter Applications Hacker Solid State Drive Avoiding Downtime File Sharing Project Management Google Maps Managed Service iPhone Black Market Flexibility Websites Mobility User Current Events Laptop Social Engineering Excel Business Growth Business Intelligence Digital Payment Customer Relationship Management Wireless Downtime DDoS Augmented Reality Information PowerPoint Data Security Paperless Office Comparison Tablet Fax Server Sports Company Culture Patch Management Computing Blockchain Machine Learning Disaster Computer Repair Hosted Solution Data Loss Telephone Systems Social Networking Word End of Support Robot Value Redundancy IT service Public Cloud Network Congestion Inbound Marketing Identity Theft Bluetooth Processors Digital Streaming Media USB Presentation Start Menu Cryptocurrency Tech Terms Virtual Reality Conferencing Vendor Pain Points Politics Automobile Net Neutrality Google Docs Mobile Technology Emails Software as a Service Chrome Co-managed IT Specifications Safety Experience Chromebook User Error Virtual Desktop Uninterrupted Power Supply Cleaning Computing Infrastructure Hack Monitoring Social Monitors How To Documents Office Tips Router Heating/Cooling Bitcoin Computer Accessories Private Cloud Entertainment Download Storage Data Protection Lifestyle Management Gaming Console YouTube Unified Communications Settings Trending Telephony Mouse Webcam Microchip Taxes Vulnerabilities Text Messaging Retail Distributed Denial of Service Healthcare Scam Statistics eWaste Programming Shortcut Tip of the week Licensing Startup Asset Tracking Thin CLient Google Calendar Hacks Point of Contact Physical Security Business Cards Service Level Agreement Directions 3D Ebay Relocation Tablets Username Smart Phones Troubleshooting VoIP Music Banking Botnet Unified Threat Management Get More Done Backup and Disaster Recovery Dark Web Entrepreneur switches Touchscreen Writing News Printer Server Gamification HIPAA Knowledge Sync Screen Reader Health IT Turn Key Customer Resource management Environment Consultation Upgrades Evernote Competition LiFi Virtual Assistant Recycling Smart Tech Distribution Leadership Electronic Payment Technology Tips Notifications CCTV Analytic Piracy Trojan Upload Adminstration Pirating Information Fake News Reliable Computing HTML Organize Business Owner Audit Business Metrics Computer Malfunction Product Reviews Fiber-Optic Database Bookmark Read Mobile Security IP Address Work/Life Balance In Internet of Things Telephone System Deep Learning Data Warehousing Application Visible Light Communication Emergency Memory Hard Drive Disposal Multi-Factor Security Cost Human Resources Access Software License Trends Processor IT consulting Microsoft Excel Device Management Scalability Devices Computer Care Motion Sickness Fraud Tactics Browsers Messenger Content Management Tracking UTM Webinar Content Business Managemenet User Tip Upselling Google Drive Windows Server 2008 Video Surveillance Digital Signature Advertising Vulnerability Flash Legislation Error CIO Spyware Mobile Payment Rental Service Meetings IT Plan Enterprise Resource Planning Windows XP online Currency Cabling Accountants A.I. Saving ZTime Staffing Electricity Google Wallet Printing Web Server email scam Addiction Data Analysis Teamwork Books Workers Multi-factor Authentication Society Wi-Fi Administrator Displays Windows 7 Debate LinkedIn Wireless Headphones Telephone Harddrive PDF cache Micrsooft Television Supercomputer Migration Connected Devices Best Available Keyboard Worker Equifax Fleet Tracking WannaCry Drones Downloads Best Practives Network Management Fileless Malware GPS Reading Archive Samsung Device security MSP External Harddrive Domains Corporate Profile Skype Proxy Server Time Management Freedom of Information Public Speaking Permissions Language G Suite Nanotechnology Electronic Medical Records Microserver Social Network Assessment SharePoint Employer Employee Relationship Desktop Finance CrashOverride Managed IT Service Capital Managing Stress 3D Printing Regulation Productuvuty Navigation Printers

toner1