Contact us today!
845-876-6561

Professional Computer Associates Blog

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

Access to Data Often Creates Opportunities for Wor...
The Internet of Things Gives Great Power to Our Ph...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Email Mobile Devices Disaster Recovery Microsoft Innovation Productivity Software Internet Data Data Backup Business Continuity Business Outsourced IT communications Ransomware Efficiency Cybercrime Smartphones Hardware IT Services Data Recovery Computer IT Support Windows 10 Cloud Computing Tech Term Android Internet of Things Browser Saving Money BDR Office Telephone Systems Computers Server Alert Workplace Tips User Tips Network Windows Business Management Small Business Applications Cybersecurity Save Money Smartphone Virtualization Miscellaneous Mobile Device Management Artificial Intelligence Upgrade Collaboration BYOD Managed IT Quick Tips Social Media Law Enforcement Chrome Facebook Social Engineering Passwords Communication Microsoft Office Firewall Holiday How To Productivity Private Cloud Office 365 Money Bandwidth Gadgets Hacking Mobility Router Automation Work/Life Balance Office Tips Managed Service Provider App Recovery Avoiding Downtime Password VPN Business Intelligence Proactive IT Data Security Flexibility Windows 10 Wi-Fi Remote Monitoring Data Management Two-factor Authentication HaaS Bring Your Own Device Budget Managed IT Services Training Operating System Information Technology Data Protection Health Gmail Phishing Redundancy Data Breach Analysis Document Management SaaS Spam Risk Management Blockchain Settings Identity Theft Big Data User Error Connectivity Employer-Employee Relationship Marketing IT Management Entertainment Encryption Mobile Computing Word Apps IT Support Black Market Vulnerability Compliance Google Drive Mobile Device Safety Sports Cleaning Value Content Filtering Wireless Technology History Comparison Best Practice Machine Learning Charger Networking Save Time Shadow IT Virtual Assistant Spam Blocking Data loss Electronic Medical Records Streaming Media Windows 7 Data storage Solid State Drive Government DDoS PDF Credit Cards Unified Threat Management Paperless Office End of Support Automobile Worker Internet Exlporer USB YouTube Computing Infrastructure Hiring/Firing Computer Care OneNote Instant Messaging Update HIPAA Physical Security Legal Meetings IT Plan Wearable Technology The Internet of Things Wireless Samsung CES Battery Apple Access Control Information Infrastructure Patch Management Unsupported Software Smart Tech Data Storage Business Owner File Sharing Servers Keyboard Website Content Management Education Workers Downtime eWaste Managed Service Scam Public Cloud Remote Computing Reputation Techology Unified Communications Storage Wire Knowledge Going Green Bluetooth Tech Support Business Technology Flash Online Shopping Nanotechnology Experience Loyalty Remote Worker Files Voice over Internet Protocol Password Management Windows Server 2008 Robot Hard Drives Environment Lithium-ion battery Proactive FENG Professional Services Relocation Video Games Running Cable Business Mangement Transportation webinar Hybrid Cloud Practices Politics Sync Customer Antivirus Theft Chromecast Smart Office Network Congestion Data Warehousing Laptop Specifications Accountants Evernote Music IaaS Wiring Colocation Multi-Factor Security Human Resources Users NIST Emails Remote Monitoring and Maintenance Tools Scalability Software as a Service Recycling Benefits Conferencing HBO Hosted Computing Windows 10s Telephony Cortana Addiction Books IBM Touchpad SharePoint Millennials Telephone System Wireless Charging Devices Assessment GDPR Screen Mirroring WiFi Trending Staff Virtual Reality Uninterrupted Power Supply Cryptocurrency Regulations Outlook Line of Business Criminal Smart Technology Distributed Denial of Service Frequently Asked Questions Fraud Inventory Skype Google Apps Emergency Students IT Consultant Internet exploMicrosoft Workforce IoT Rootkit People Fiber-Optic Thought Leadership Troubleshooting Television Cache E-Commerce Supercomputer Cast hacker Lifestyle Digital Signature Worker Commute Employer Employee Relationship Safe Mode Humor Notifications MSP Botnet iPhone Search Fax Server Google Docs HVAC Excel Amazon Audit Start Menu Healthcare Leadership Advertising Telecommuting Content Mobile Office Cables Content Filter Hosted Solution Public Computer NarrowBand Wireless Internet Current Events Strategy Computer Accessories Netflix Monitor Authentication Augmented Reality Root Cause Analysis Travel How to IT solutions Two Factor Authentication Mouse Enterprise Content Management Tip of the week Amazon Web Services Computer Fan Mobile Password Manager Electronic Health Records Software Tips Remote Work Insurance Audiobook Vendor Management Twitter Company Culture Webinar Managing Stress Regulation Thank You IT solutions CrashOverride Printers Administration Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!