facebook linkedin twitter

Technology Basics: Wizard

Technology Basics: Wizard

The word “wizard” may not seem to have much to do with computing, besides calling someone a “computer wiz.” However, there is a particular type of program that serves a very similar purpose, referred to as a wizard as well. We’ll examine it in today’s blog.

What a Wizard Does
Be honest - what first comes to mind when you hear the word “wizard?” Most likely, an old man with a beard, robes, and a pointy hat, waving a wand around and casting spells. These characters often serve as mentors, serving as a guide and a resource.

This is the same purpose that the wizard program serves on your computer. Like Dumbledore instructed Harry Potter and Gandalf pointed Frodo Baggins in the right direction, a software wizard walks a user, step-by-step, to the successful completion some task or goal. This goal is usually the installation and configuration of a program, or possibly running a scan.

What Makes a Wizard?
A software wizard typically breaks up whatever process it applies to into steps, each step represented by a separate page. This allows the wizard to ensure each step is properly completed before progressing with its task. Wizards will often also display progress bars and the like when a process will take some time.

Many wizards today go by different names, or have had their functions absorbed by other programs. Virtual assistants and office assistants both help users in a similar way, but many applications and online forms emulate wizards for the benefit of the user.

When was the last time you saw a wizard? Tell us in the comments!

BaaS Lets You Take Decentralization for a Test Dri...
Hackers Target Municipalities and Why That’s a Pro...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Saving Money Network Security Email Malware Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Smartphones Quick Tips Mobile Devices User Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Android Social Media Network Data Backup Collaboration Mobile Office Virtualization Productivity Server Smartphone Mobile Device Management Communication Data Recovery Miscellaneous Upgrade Ransomware Windows 10 Tech Term communications Unified Threat Management Windows IT Support Remote Monitoring Operating System Passwords Holiday Facebook Mobile Computing Managed IT services BYOD Remote Computing Vendor Management Apps Cybersecurity Users BDR WiFi Phishing Automation Analytics The Internet of Things Marketing Mobile Device History Data Management Apple Firewall Outsourced IT Artificial Intelligence Browser Internet of Things Managed IT Services Save Money App Alert Big data Encryption IT Consultant Maintenance Bandwidth Bring Your Own Device Printer Antivirus Cloud Computing Spam Health Office 365 Content Filtering Going Green Gmail Office Windows 10 Help Desk Cybercrime Wireless Technology Managed IT Tech Support Virus Search Cost Management Hiring/Firing Hard Drives Budget Business Technology Lithium-ion Battery Best Practice Information Technology Saving Time Two-factor Authentication Windows 8 Outlook Recovery Employer-Employee Relationship Healthcare Update Hacking Access Control Money Phone System Document Management Training Computers Blockchain VPN IBM Travel PowerPoint Mobility Law Enforcement Humor Risk Management Compliance Administration Data storage Applications Save Time Managed Service Legal Networking Proactive IT Running Cable It Management Regulations Customer Service Information Twitter SaaS Intranet Website Hard Drive Education Augmented Reality Government Data Breach Google Maps Robot Securty Social Engineering Digital Word Project Management Solid State Drive Websites Value Business Intelligence Password Cortana Digital Payment Black Market Flexibility Cryptocurrency Hacker Router Downtime Laptop Avoiding Downtime Comparison Business Growth Tablet iPhone Current Events Machine Learning Company Culture User Data Security Computer Repair Telephone Systems Social Networking Excel Paperless Office Social Patch Management Data Loss Sports Wireless Scam File Sharing Disaster Customer Relationship Management DDoS Fax Server Computing Hosted Solution End of Support Vulnerabilities Streaming Media Gaming Console Politics Evernote Virtual Reality IT service Emails Webcam Retail Automobile Text Messaging Net Neutrality eWaste Chromebook Chrome Bluetooth Start Menu Tech Terms Computing Infrastructure Hack Mobile Technology How To Private Cloud Software as a Service Download Computer Accessories Inbound Marketing Uninterrupted Power Supply Cooperation Google Docs Processors Telephony Experience Vendor Conferencing USB Taxes Trending Cleaning Presentation Monitors Bitcoin Microchip Mouse Data Protection Co-managed IT Office Tips Pain Points User Error Distributed Denial of Service Virtual Desktop Specifications Safety Monitoring Statistics Public Cloud YouTube Programming Unified Communications Settings Network Congestion Documents Heating/Cooling Entertainment Lifestyle Identity Theft Management Storage Redundancy Network Management Recycling Permissions Language VoIP Voice over Internet Protocol Reliable Computing Equifax Fleet Tracking Analytic PDF Best Practives Touchscreen Fileless Malware News Business Metrics Computer Malfunction Debate Best Available Keyboard Knowledge Modem Device security MSP Harddrive Product Reviews Consultation Proxy Server In Internet of Things Desktop Finance Music Domains Microserver Electronic Medical Records Technology Tips Nanotechnology Social Network switches Writing GPS Read Term Virtual Assistant Business Cards Service Level Agreement External Harddrive Public Speaking Audit Recording Scalability Startup Asset Tracking Upgrades Directions Fake News Motion Sickness Shortcut SSID Messenger Tracking Username Get More Done Dark Web Data Warehousing Unified Threat Management Backup and Disaster Recovery Device Management LiFi Rental Service Meetings Gamification Business Managemenet Thin CLient Troubleshooting Access Turn Key Health IT Screen Reader Customer Resource management Content Management 3D Ebay Entrepreneur Printer Server Emergency Processing Hard Drive Disposal Piracy Upload Smart Phones Work/Life Balance HIPAA Computer Care Cabling Smart Tech Distribution Deep Learning Environment Trojan Managed IT Service Microsoft Excel Web Server Visible Light Communication online Currency Memory Competition Organize Books Workers HTML Electronic Payment Google Drive Bookmark Windows Server 2008 Wi-Fi Administrator Fiber-Optic Database Vulnerability Google Play Supercomputer Mobile Security Leadership Business Owner Spyware Mobile Payment Telephone System IT consulting Adminstration Pirating Information Software License Trends LinkedIn Electricity IP Address Printing Worker Multi-Factor Security Cost Processor Tactics Advertising Flash Application Medical IT Reading Samsung Devices CIO Human Resources Browsers Windows 7 Fraud Webinar Security Cameras Employer Employee Relationship UTM Content Staffing Google Wallet Skype cache User Tip Television G Suite Windows XP Archive Hacks Physical Security IT Plan Enterprise Resource Planning Society WannaCry Downloads Licensing Legislation Error Displays Navigation email scam Addiction Digital Signature Corporate Profile Professional Services Relocation Tablets Accountants A.I. Point of Contact Micrsooft Upselling Time Management Data Analysis Freedom of Information Banking Botnet Teamwork GDPR Multi-factor Authentication Drones Assessment SharePoint Sync Video Surveillance Notifications CCTV Migration Connected Devices Saving ZTime Google Calendar Wireless Headphones Telephone Tech Tip of the week Capital Productuvuty Managing Stress 3D Printing Regulation Printers CrashOverride