Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register
2 minutes reading time (315 words)

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

How a Data Backup Can Be Used, No Disaster Necessa...
The Internet of Things Gives Great Power to Our Ph...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Email Network Security Malware Data Backup Google Hackers Tech Term VoIp Cloud Computing Microsoft Managed IT Services Software Outsourced IT Managed IT Services Mobile Devices Android Hosted Solutions IT Support Backup Small Business Data Recovery Internet Efficiency Cybersecurity Internet of Things Alert Data Cybercrime User Tips Ransomware Communications Innovation BDR Saving Money Communication How To Hardware Data Protection Chrome Browser Router Money Productivity Business Management Mobile Device Management Data Security Computers Business Continuity Artificial Intelligence Phishing Collaboration Two-factor Authentication Windows Smartphone Smartphones Network IT Services Business Intelligence Spam Disaster Recovery Social Engineering Office 365 Remote Monitoring Managed IT Windows 10 Telephone Systems Vulnerability Identity Theft Connectivity IT Management Word BYOD Business Servers Employer-Employee Relationship Redundancy Private Cloud Website Workers App Networking Comparison Social Media Upgrade Budget IT Plan Infrastructure Data Breach Unsupported Software Value Windows 7 Work/Life Balance CES Applications Avoiding Downtime Gadgets Password Server Data Storage Save Money Compliance Update Content Management Microsoft Office Apps Operating System VPN OneNote Spam Blocking Paperless Office Bring Your Own Device Computer Facebook Holiday Blockchain Law Enforcement Document Management Credit Cards Virtualization Mobile Device Wi-Fi Hosted Computing Data loss HIPAA USB Audit Software as a Service Keyboard Tip of the week Enterprise Content Management Trending HaaS Legal Charger Professional Services Fraud YouTube Root Cause Analysis Cortana Business Mangement Devices Google Drive Botnet Risk Management Netflix Encryption Inventory Screen Mirroring Passwords Skype Data Management Wire Data Warehousing Samsung Wireless Charging Proactive IT Windows Server 2008 Electronic Medical Records Password Management Sync Content Filtering IT Consultant Criminal Addiction Public Cloud Amazon Scam Google Apps SaaS Gmail Thought Leadership Hiring/Firing Travel Telecommuting Bandwidth FENG HBO Flexibility IBM Access Control Cast Virtual Assistant Specifications Human Resources Sports Computer Fan Government NIST Information Technology Lifestyle Cleaning Amazon Web Services Smart Tech Voice over Internet Protocol Current Events Recycling Remote Work Outlook Firewall Supercomputer Authentication IT Support Telephone System Start Menu Millennials Automation webinar Staff Smart Office The Internet of Things Software Tips HVAC Meetings Patch Management Cryptocurrency Regulations Mobile Computing Cache Recovery Computer Care Online Shopping Knowledge eWaste Settings Entertainment Frequently Asked Questions Password Manager Nanotechnology Training Tools Workforce Conferencing Digital Signature Black Market Practices Flash Safe Mode Office Tips Leadership Wireless Internet Solid State Drive Mobility Evernote Workplace Tips Multi-Factor Security Network Congestion Windows 10s Telephony Mobile Accountants Machine Learning Downtime Excel Google Docs Theft Marketing Big Data PDF Physical Security File Sharing Twitter VoIP Students Thank You Business Technology Assessment Help Desk Computer Accessories IoT Company Culture Strategy Healthcare Congratulations Rootkit Business Owner Fiber-Optic Managing Stress Television Consultation Bluetooth Two Factor Authentication Streaming Media Employer Employee Relationship Vendor Management Analysis Electronic Health Records Cables Insurance Worker Public Computer Loyalty Office Quick Tips Content Filter Health Unified Communications Unified Threat Management Save Time Miscellaneous Safety WiFi Managed Service Provider Bata Backup Windows 10 Storage Hacking Battery Automobile Education

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD