Technology Basics: Wizard

Technology Basics: Wizard

The word “wizard” may not seem to have much to do with computing, besides calling someone a “computer wiz.” However, there is a particular type of program that serves a very similar purpose, referred to as a wizard as well. We’ll examine it in today’s blog.

What a Wizard Does
Be honest - what first comes to mind when you hear the word “wizard?” Most likely, an old man with a beard, robes, and a pointy hat, waving a wand around and casting spells. These characters often serve as mentors, serving as a guide and a resource.

This is the same purpose that the wizard program serves on your computer. Like Dumbledore instructed Harry Potter and Gandalf pointed Frodo Baggins in the right direction, a software wizard walks a user, step-by-step, to the successful completion some task or goal. This goal is usually the installation and configuration of a program, or possibly running a scan.

What Makes a Wizard?
A software wizard typically breaks up whatever process it applies to into steps, each step represented by a separate page. This allows the wizard to ensure each step is properly completed before progressing with its task. Wizards will often also display progress bars and the like when a process will take some time.

Many wizards today go by different names, or have had their functions absorbed by other programs. Virtual assistants and office assistants both help users in a similar way, but many applications and online forms emulate wizards for the benefit of the user.

When was the last time you saw a wizard? Tell us in the comments!

BaaS Lets You Take Decentralization for a Test Dri...
Hackers Target Municipalities and Why That’s a Pro...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Smartphones Quick Tips Gadgets Business Continuity Mobile Devices User Tips Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Innovation Android Server Mobile Device Management VoIP Social Media Smartphone Ransomware Windows 10 Upgrade Miscellaneous Unified Threat Management Windows Operating System Remote Monitoring Passwords BYOD Remote Computing Collaboration Managed IT services Communication Holiday Mobile Computing WiFi Cybersecurity Vendor Management Apps IT Support The Internet of Things Data Backup Marketing Facebook Data Recovery Analytics History Firewall Apple communications Users BDR Internet of Things Data Management Alert Productivity Automation Tech Term IT Consultant Save Money Outsourced IT Managed IT Services App Phishing Artificial Intelligence Health Bring Your Own Device Spam Bandwidth Content Filtering Office Going Green Mobile Device Gmail Big data Wireless Technology Browser Antivirus Cybercrime Hiring/Firing Search Hard Drives Cost Management Windows 8 Outlook Managed IT Maintenance Lithium-ion Battery Encryption Best Practice Information Technology Printer Budget Tech Support Virus Help Desk Phone System Recovery Money Employer-Employee Relationship Document Management Hacking Computers Travel Office 365 Update IBM Regulations Save Time Government Website Hard Drive Windows 10 SaaS Administration Proactive IT Law Enforcement Running Cable Cloud Computing Saving Time Compliance VPN Data storage Intranet Education Humor It Management Business Technology Legal Risk Management Customer Service Training Two-factor Authentication Networking PowerPoint Business Intelligence DDoS Paperless Office Digital Payment File Sharing Data Breach Downtime Current Events Disaster Word Hosted Solution Comparison Tablet Mobility Project Management End of Support Social Engineering Robot Company Culture Securty Computer Repair Password Cortana Avoiding Downtime Social Networking Solid State Drive Fax Server Hacker Access Control iPhone Black Market Twitter Flexibility Data Security Excel User Laptop Telephone Systems Business Growth Customer Relationship Management Patch Management Blockchain Wireless Data Loss Applications Augmented Reality Scam Chrome Heating/Cooling Gaming Console Identity Theft Storage Redundancy YouTube Unified Communications Settings Webcam Sports Text Messaging Router Computing Computer Accessories Google Maps Virtual Reality Co-managed IT Digital User Error Retail Politics eWaste Automobile Trending Emails Websites Start Menu Tech Terms IT service Mouse Value Chromebook Computing Infrastructure Hack Mobile Technology Inbound Marketing How To Statistics Lifestyle Software as a Service Programming Uninterrupted Power Supply Bluetooth Download Network Congestion Private Cloud Processors USB Vulnerabilities Pain Points Cryptocurrency Healthcare Presentation Telephony Bitcoin Data Protection Taxes Google Docs Streaming Media Machine Learning Virtual Desktop Distributed Denial of Service Experience Specifications Safety Social Cleaning Monitors Net Neutrality Office Tips Documents Public Cloud Windows XP Smart Tech Device Management Teamwork Banking Botnet Assessment Staffing SharePoint Piracy Google Wallet Upload Trojan Entertainment Relocation Tablets Content Management Organize Sync Google Calendar Fiber-Optic Society Database Harddrive Business Managemenet Tip of the week HTML Displays Debate PDF VoIP Conferencing Notifications CCTV Touchscreen News Mobile Security Micrsooft GPS Knowledge Multi-Factor Security External Harddrive online Currency Best Available Business Metrics Keyboard Computer Malfunction Consultation Evernote Software License Drones Trends Reliable Computing In Internet of Things Technology Tips Fraud Tactics Domains Virtual Assistant Devices Webinar Audit Permissions Monitoring Language Thin CLient LinkedIn Public Speaking Fake News UTM Content 3D Ebay Legislation Smart Phones Shortcut Motion Sickness Data Warehousing IT Plan Enterprise Resource Planning Scalability Archive Entrepreneur Access email scam Music Addiction Skype Troubleshooting Messenger Tracking Emergency switches Hard Drive Disposal Accountants Writing Environment Computer Care Management Leadership HIPAA Rental Service Meetings Microsoft Excel Multi-factor Authentication Upgrades Information Adminstration Pirating Information LiFi Wireless Headphones Competition Web Server Google Drive Windows Server 2008 Migration Connected Devices Point of Contact Electronic Payment Cabling Wi-Fi Administrator Spyware Mobile Payment Network Management Best Practives Business Owner Books Workers Vulnerability Equifax Electricity Printing Work/Life Balance IP Address Supercomputer Device security Deep Learning MSP Visible Light Communication Nanotechnology Memory Recycling Microchip Microserver Application Windows 7 Desktop Finance Analytic Human Resources Worker cache Television Business Cards Service Level Agreement Upselling Product Reviews Reading Samsung IT consulting Startup Read G Suite WannaCry Downloads Unified Threat Management Backup and Disaster Recovery Get More Done Employer Employee Relationship Video Surveillance Licensing Corporate Profile Advertising Screen Reader Flash Saving ZTime Digital Signature Hacks Turn Key Physical Security Time Management CIO Freedom of Information Gamification Printer Server CrashOverride Managing Stress Capital Productuvuty 3D Printing Username