facebook linkedin twitter

Technology Basics: Wizard

Technology Basics: Wizard

The word “wizard” may not seem to have much to do with computing, besides calling someone a “computer wiz.” However, there is a particular type of program that serves a very similar purpose, referred to as a wizard as well. We’ll examine it in today’s blog.

What a Wizard Does
Be honest - what first comes to mind when you hear the word “wizard?” Most likely, an old man with a beard, robes, and a pointy hat, waving a wand around and casting spells. These characters often serve as mentors, serving as a guide and a resource.

This is the same purpose that the wizard program serves on your computer. Like Dumbledore instructed Harry Potter and Gandalf pointed Frodo Baggins in the right direction, a software wizard walks a user, step-by-step, to the successful completion some task or goal. This goal is usually the installation and configuration of a program, or possibly running a scan.

What Makes a Wizard?
A software wizard typically breaks up whatever process it applies to into steps, each step represented by a separate page. This allows the wizard to ensure each step is properly completed before progressing with its task. Wizards will often also display progress bars and the like when a process will take some time.

Many wizards today go by different names, or have had their functions absorbed by other programs. Virtual assistants and office assistants both help users in a similar way, but many applications and online forms emulate wizards for the benefit of the user.

When was the last time you saw a wizard? Tell us in the comments!

BaaS Lets You Take Decentralization for a Test Dri...
Hackers Target Municipalities and Why That’s a Pro...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Google Small Business Efficiency User Tips Smartphones Gadgets Computer Quick Tips Business Continuity Mobile Devices Disaster Recovery Mobile Office Virtualization Network Microsoft Office Android Social Media Innovation Mobile Device Management Server VoIP Miscellaneous Smartphone Communication Upgrade Ransomware Windows 10 Unified Threat Management Collaboration Windows Tech Term Passwords Data Recovery Remote Monitoring Data Backup Operating System Holiday IT Support Mobile Computing Managed IT services BYOD Remote Computing Apps Cybersecurity communications Facebook WiFi Vendor Management Marketing The Internet of Things Firewall Apple Automation Users BDR Analytics History Alert Data Management Phishing Managed IT Services Outsourced IT Internet of Things Productivity App Artificial Intelligence Mobile Device Save Money IT Consultant Office Content Filtering Going Green Big data Maintenance Spam Gmail Bring Your Own Device Bandwidth Antivirus Health Browser Cost Management Windows 8 Outlook Lithium-ion Battery Best Practice Information Technology Budget Two-factor Authentication Printer Tech Support Virus Hiring/Firing Wireless Technology Hard Drives Cybercrime Search Managed IT Encryption Travel Hacking Update Office 365 IBM Cloud Computing Help Desk Money Document Management Recovery Employer-Employee Relationship Phone System Computers Training Intranet Access Control Education Networking Legal Hard Drive It Management Business Technology Regulations Risk Management Humor Save Time SaaS Customer Service Law Enforcement Government Windows 10 Website Administration Compliance Proactive IT Running Cable Data storage Saving Time VPN Laptop Twitter iPhone Applications Hacker Business Growth File Sharing Fax Server Data Security Excel Patch Management Blockchain User Paperless Office Mobility Sports Customer Relationship Management Data Loss Business Intelligence Social Engineering Computing Digital Payment Augmented Reality Disaster Wireless PowerPoint End of Support Hosted Solution Downtime DDoS Robot Data Breach Securty Comparison Tablet Company Culture Project Management Solid State Drive Computer Repair Machine Learning Word Social Networking Current Events Flexibility Telephone Systems Black Market Password Cortana Avoiding Downtime Google Docs Public Cloud Uninterrupted Power Supply Experience Processors Bitcoin Monitors Identity Theft Pain Points Cleaning Streaming Media Office Tips USB Lifestyle Data Protection Managed Service Conferencing Google Maps Presentation YouTube Net Neutrality Virtual Reality Politics Chrome Automobile Virtual Desktop Unified Communications Settings Emails Specifications Safety Monitoring Social Scam Chromebook Documents Redundancy Computing Infrastructure Hack Gaming Console Router Computer Accessories How To Heating/Cooling Management Private Cloud Webcam IT service Information Download Storage Text Messaging Trending Digital Websites Vulnerabilities Mouse Telephony Healthcare Start Menu Tech Terms Bluetooth Taxes Retail Programming Vendor eWaste Statistics Distributed Denial of Service Mobile Technology Inbound Marketing Co-managed IT Software as a Service Value User Error Cryptocurrency Network Congestion Unified Threat Management Backup and Disaster Recovery Licensing Entrepreneur Leadership Visible Light Communication Memory Username Hacks Physical Security Troubleshooting Adminstration Webinar Pirating Information Google Drive Windows Server 2008 Customer Resource management Relocation Tablets User Tip Environment Vulnerability IT consulting Gamification Banking Botnet HIPAA Spyware Mobile Payment Screen Reader Electronic Payment Piracy Upload Recycling Sync Competition Electricity Printing Smart Tech Distribution Analytic Windows 7 CIO Fiber-Optic Database Advertising Flash HTML Product Reviews Notifications CCTV Business Owner Telephone System Read Reliable Computing Windows XP Mobile Security Business Metrics Computer Malfunction IP Address cache Television Staffing Google Wallet Human Resources Displays Software License Trends In Internet of Things Application Upselling Best Practives WannaCry Downloads Society Multi-Factor Security Cost Video Surveillance Time Management Freedom of Information Micrsooft Fraud Tactics Device Management Corporate Profile Devices Drones Content Management Scalability Saving ZTime Microserver UTM Content Business Managemenet Motion Sickness Assessment SharePoint Tracking Electronic Medical Records Tip of the week IT Plan Enterprise Resource Planning Digital Signature Google Calendar Legislation Error Messenger Debate Touchscreen News email scam Addiction online Currency Teamwork Harddrive Get More Done VoIP Permissions Language Accountants A.I. Rental Service Meetings Entertainment Cabling Turn Key Knowledge Multi-factor Authentication Web Server GPS Printer Server Consultation Evernote Books Workers Health IT PDF External Harddrive Virtual Assistant switches Writing Migration Connected Devices LinkedIn Wi-Fi Administrator Trojan Technology Tips Music Wireless Headphones Telephone Organize Fake News Upgrades Network Management Best Available Keyboard Audit Equifax Fleet Tracking Supercomputer Archive Worker Thin CLient LiFi Device security MSP Skype Microchip Domains 3D Ebay Data Warehousing Reading Samsung Smart Phones Emergency Hard Drive Disposal Desktop Finance Public Speaking Access Nanotechnology Social Network Microsoft Excel Deep Learning Business Cards Service Level Agreement G Suite Shortcut Computer Care Work/Life Balance Startup Asset Tracking Point of Contact Employer Employee Relationship 3D Printing Printers Managing Stress Regulation CrashOverride Capital Productuvuty

toner1