094 90 48200     Get SUPPORT

Aniar IT Services Blog

2 minutes reading time (315 words)

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

How a Data Backup Can Be Used, No Disaster Necessa...
The Internet of Things Gives Great Power to Our Ph...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Microsoft Email Tech Term Business Computing Cloud Cloud Computing Data Backup Malware Android VoIP Data Recovery Small Business How To Hackers Network Security Innovation Backup User Tips Internet Cybercrime Communication Data Computers Software Chrome Artificial Intelligence Cybersecurity Smartphone Browser Windows Communications Collaboration Internet of Things Hardware Managed IT Services Mobile Devices Ransomware Two-factor Authentication Router Money Data Security BDR Efficiency Data Protection Network Office 365 Vulnerability Business Management Saving Money Business Smartphones Spam Connectivity Mobile Device Management Windows 10 Word Facebook Comparison Computer Infrastructure Remote Monitoring IT Plan OneNote Passwords Content Management Virtualization Law Enforcement VPN Password Apps Unsupported Software Blockchain Data Storage Managed IT Update Business Intelligence Microsoft Office Hosted Solutions Outsourced IT Business Continuity Spam Blocking Paperless Office Windows 7 Website Managed IT services Identity Theft Bring Your Own Device Redundancy Operating System IT Management Upgrade App Telephone Systems IT Support Social Engineering BYOD IT Services Avoiding Downtime Phishing CES Applications Excel Recycling Devices Employer-Employee Relationship Fraud Wi-Fi Encryption Audit Physical Security Workplace Tips Authentication Root Cause Analysis Human Resources Private Cloud YouTube Safe Mode Flash Google Docs Cache Settings Cast Smart Office Value Workforce Keyboard Practices Tip of the week eWaste Thought Leadership Specifications Amazon Networking Bandwidth Telephony Trending Staff Public Cloud Virtual Assistant HaaS Scam Wireless Internet Document Management The Internet of Things Charger Hosted Computing Windows Server 2008 Gadgets Legal Automation Server Data loss Amazon Web Services Accountants Computer Fan Enterprise Content Management Password Manager Nanotechnology Software Tips HBO Save Money HIPAA USB Botnet Telecommuting Big Data Wireless Charging Inventory Password Management Computer Care Criminal Cortana Alert Disaster Recovery Holiday FENG Government Business Mangement Smart Tech Skype Digital Signature Servers Outlook Mobile Device Telephone System Voice over Internet Protocol Electronic Medical Records Wire Entertainment Travel Remote Work Google Apps NIST Patch Management Social Media Addiction Tools Work/Life Balance Online Shopping Productivity Frequently Asked Questions Recovery Gmail Meetings Start Menu Credit Cards PDF Solid State Drive HVAC Workers Access Control Downtime Sync Multi-Factor Security Data Management Sports Windows 10s Google Drive Machine Learning Cryptocurrency Screen Mirroring Millennials Evernote Cleaning Presentation Lithium-ion battery Augmented Reality Tech Support Wireless Technology 5G IBM Hard Drives Safety Company Culture Search Marketing Hacker Productivity Budget Customer Relationship Management Competition Managing Stress CrashOverride IP Address Users Twitter Emergency Customer Service Miscellaneous Managed Service Provider Mobile Office Domains Hiring/Firing Wireless Windows 10 Fun WiFi Public Speaking