Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Basics: Wizard

Technology Basics: Wizard

The word “wizard” may not seem to have much to do with computing, besides calling someone a “computer wiz.” However, there is a particular type of program that serves a very similar purpose, referred to as a wizard as well. We’ll examine it in today’s blog.

What a Wizard Does
Be honest - what first comes to mind when you hear the word “wizard?” Most likely, an old man with a beard, robes, and a pointy hat, waving a wand around and casting spells. These characters often serve as mentors, serving as a guide and a resource.

This is the same purpose that the wizard program serves on your computer. Like Dumbledore instructed Harry Potter and Gandalf pointed Frodo Baggins in the right direction, a software wizard walks a user, step-by-step, to the successful completion some task or goal. This goal is usually the installation and configuration of a program, or possibly running a scan.

What Makes a Wizard?
A software wizard typically breaks up whatever process it applies to into steps, each step represented by a separate page. This allows the wizard to ensure each step is properly completed before progressing with its task. Wizards will often also display progress bars and the like when a process will take some time.

Many wizards today go by different names, or have had their functions absorbed by other programs. Virtual assistants and office assistants both help users in a similar way, but many applications and online forms emulate wizards for the benefit of the user.

When was the last time you saw a wizard? Tell us in the comments!

BaaS Lets You Take Decentralization for a Test Dri...
Your Backup Needs to Meet Some Prerequisites
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Tech Term Business Computing Android Hackers IT Support Google Software Cybersecurity Malware Data Data Recovery Smartphone Business Management User Tips Internet Backup Innovation Email Small Business Managed IT Services Data Backup Ransomware Cloud Productivity Artificial Intelligence Efficiency Windows 10 Phishing Communications Cost Management Computer IT Management Business Hardware BDR Cybercrime Business Technology Mobile Device Management Collaboration Patch Management Network Hard Drive Update Managed IT Services Saving Money Access Control App Outsourced IT Applications Data Security IT Services Encryption Gadgets Blockchain Antivirus Microsoft Bandwidth Start Menu Law Enforcement Passwords Scam Holiday Browser Websites Laptop Data Management Smartphones Tech Terms Data loss Hacking Business Continuity Disaster Recovery Project Management Mobile Device Data Protection Alert Data Breach Office 365 Windows Automation Apps VPN Server Internet of Things Operating System Facebook Bitcoin Maintenance SaaS Remote Monitoring Social Engineering Money Search Microsoft Office Social Media Gmail Touchscreen Spam Save Money Vulnerabilities Word Digital Document Management Disaster Tip of the week Vendor Mangement Addiction Website Content Computing Infrastructure Access Screen Reader Google Docs Virtual Reality Distributed Denial of Service Running Cable Business Mangement Machine Learning BYOD Legislation Unified Communications Networking Solid State Drive WiFi Telephone Systems Spyware Communication Budget Company Culture Redundancy Freedom of Information Knowledge Cortana Cabling IT Support HTML Information Virtualization Printing Business Cards Software as a Service Wireless Tablet Consultant Analytics Conferencing Identity Theft Network Management News Virtual Assistant Travel Apple Government Uninterrupted Power Supply How to Chromebook Comparison Desktop Service Level Agreement Fake News Worker Google Drive Devices Username Emails Legal Downtime Virus Big Data Backup and Disaster Recovery Going Green Managed Service Provider Google Maps Hard Drive Disposal Cloud Computing Telephony Samsung Compliance Bluetooth Downloads Piracy History Specifications Unified Threat Management YouTube Download Emergency Microsoft Excel email scam VoIP Regulations Wireless Headphones VoIp Software License IBM Television Settings Hosted Solutions Automobile Printer Mobile Security Upload Vulnerability Cryptocurrency Audit Mobile Devices Accountants Cleaning Mobility Mouse Best Practice Administration Employer-Employee Relationship Paperless Office Two-factor Authentication Trends DDoS eWaste Time Management Corporate Profile Training Computers Information Technology Managed IT Unsupported Software Password Database Multi-factor Authentication Gamification Equifax Computer Care Robot Nanotechnology Google Calendar Mobile Technology Excel Tactics Device security Startup Unified Threat Management Augmented Reality Outlook SharePoint Upgrades Windows 10 Marketing Twitter Office Users Office Tips CrashOverride Managing Stress Multi-Factor Security

Latest Blog

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.