Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Wizard

Know Your Tech: Wizard

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose--to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users--gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

Access to Data Often Creates Opportunities for Wor...
The Internet of Things Gives Great Power to Our Ph...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Disaster Recovery Mobile Devices Microsoft Software Productivity Business Internet Email Business Continuity Data Innovation Outsourced IT Data Backup Efficiency Cybercrime communications Ransomware Smartphones IT Support Windows 10 Computer Cloud Computing IT Services Browser Data Recovery Android Hardware BDR Internet of Things Office Alert Telephone Systems Tech Term Computers Server Windows Business Management Saving Money Upgrade User Tips Cybersecurity Mobile Device Management Small Business Smartphone Virtualization Network Quick Tips BYOD Managed IT Social Engineering Microsoft Office Collaboration Save Money Law Enforcement Chrome Workplace Tips Firewall Artificial Intelligence Private Cloud Bandwidth Password Hacking Facebook Office Tips Managed Service Provider Communication Mobility Router Work/Life Balance Holiday How To Avoiding Downtime Money Office 365 Social Media Productivity Miscellaneous Passwords Recovery App Health Information Technology Redundancy Business Intelligence Budget VPN Data Management Two-factor Authentication Bring Your Own Device Flexibility Wi-Fi Operating System Data Protection Gmail Phishing Proactive IT Data Security HaaS Applications Automation Remote Monitoring Connectivity Identity Theft Risk Management Value Gadgets Employer-Employee Relationship Windows 10 Document Management Black Market Word Google Drive Cleaning Blockchain Apps Compliance SaaS Spam Mobile Device User Error Marketing Data Breach Entertainment Big Data Vulnerability Safety Managed IT Services Hiring/Firing Data Storage HIPAA Public Cloud Website Computer Care Remote Computing Workers Wireless Technology Paperless Office Samsung Patch Management Business Owner Keyboard PDF DDoS Credit Cards Windows 7 Scam Computing Infrastructure IT Management CES Physical Security Mobile Computing Smart Tech OneNote Save Time Meetings IT Plan Content Management Wireless Apple Worker Automobile Unsupported Software USB Downtime Servers History eWaste Legal Comparison Battery Training Best Practice Settings Shadow IT Data storage Government Streaming Media Spam Blocking Education End of Support Data loss Internet Exlporer Content Filtering YouTube Access Control Infrastructure Encryption Update Charger Networking IT Support The Internet of Things Electronic Medical Records Solid State Drive Wearable Technology Sports Analysis NarrowBand Start Menu Nanotechnology Audit Virtual Reality Mobile Office Business Mangement Smart Office Remote Work NIST Supercomputer IT solutions Tip of the week Accountants Emergency Instant Messaging Reputation Files Mobile Employer Employee Relationship Computer Fan Worker Commute Recycling Knowledge Hybrid Cloud Voice over Internet Protocol Cryptocurrency Current Events Windows Server 2008 Search Customer Colocation Chromecast Professional Services Devices Computer Accessories FENG Wireless Charging Data Warehousing Criminal Network Congestion Antivirus Multi-Factor Security Students Safe Mode IoT Emails How to Tools Thought Leadership Bluetooth Fiber-Optic Uninterrupted Power Supply Experience Techology Trending Healthcare Loyalty Distributed Denial of Service Fraud File Sharing WiFi Regulations Transportation hacker Content Filter Cables Music IT Consultant Lifestyle Electronic Health Records Amazon Business Technology Insurance Benefits Botnet Storage Unified Communications Leadership Machine Learning Assessment Mouse Amazon Web Services Virtual Assistant Practices Smart Technology Netflix Going Green Travel Rootkit Root Cause Analysis Theft Tech Support Software Tips Human Resources Troubleshooting Robot Television Relocation Online Shopping Telephone System Flash Hosted Computing Lithium-ion battery Laptop Environment Addiction Cortana Content Public Computer Staff Hosted Solution webinar Running Cable Specifications Evernote Sync Inventory Two Factor Authentication IaaS Audiobook Touchpad Software as a Service Cache Vendor Management Google Apps HVAC HBO Digital Signature Conferencing Outlook Millennials SharePoint Telephony Windows 10s Politics Hard Drives Internet exploMicrosoft Wireless Internet Screen Mirroring Enterprise Content Management Frequently Asked Questions Strategy Video Games Humor Workforce iPhone Skype Authentication Users Password Manager Advertising Notifications Google Docs Wire Unified Threat Management People Cast Telecommuting Password Management IBM Fax Server Excel Books Scalability Monitor Webinar Thank You IT solutions Administration CrashOverride Congratulations Twitter Company Culture Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!