Kate’s Complete Guide to Computers: From “Which End Do I Plug In?” to Staying Safe Online

Meet Kate. Kate is smart, capable, and recently the proud owner of a brand-new computer. Kate has successfully assembled flat-pack furniture, raised children, and once navigated a roundabout in France without GPS. She can absolutely do this. And so can you.

This guide is for everyone who has ever stared at a computer like it owes them money. We’ll start from the very beginning — no jargon, no judgement — and work our way up to keeping you safe online. By the end, you’ll feel confident, competent, and maybe just a little smug at family gatherings.

Let’s begin.

Part 1: Meeting Your Computer (It Won’t Bite)

What Even Is a Computer?

A computer is an electronic device that processes information. Think of it as an incredibly fast, incredibly literal assistant that does exactly what you tell it — which sounds wonderful until you realise you accidentally told it to delete something important. We’ll cover that.

There are a few main types you’ll encounter:

Desktop computers sit on (or under) a desk. They have a separate screen, keyboard, and a big box called a “tower” or “case” that does all the actual thinking. They’re powerful, good value, and completely immovable. Perfect if you like your technology to stay put.

Laptops are portable computers with everything built in — screen, keyboard, and brain all in one slim package. Kate has a laptop, which means she can work from the sofa, the kitchen table, or technically a beach, though sandy keyboards are nobody’s friend.

Tablets (like iPads) are mostly touchscreen and brilliant for browsing, reading, and watching videos. They’re what happens when a laptop goes on a diet.

For this guide, we’ll assume you’re using a laptop or desktop, but most of this applies everywhere.

The Parts of Your Computer: A Friendly Tour

Before Kate can do anything useful, she needs to know what she’s looking at. Here’s the cast of characters:

The screen (monitor): This is where everything happens visually. If nothing appears on it, the computer isn’t on. Or the brightness is down. Both are surprisingly common.

The keyboard: Your main way of typing text and giving commands. Those mysterious keys like “Ctrl,” “Alt,” and “Fn” do genuinely useful things — we’ll get to them. The “any key” that old instructions told you to press? There isn’t one. They meant any key. Chaos, frankly.

The mouse or trackpad: This controls a little arrow on screen called the cursor. You move the mouse on a flat surface (desktop) or drag your finger on the trackpad (laptop) to move the cursor. You then click to select things. Left click selects or opens. Right click gives you a menu of options. Double click opens things. It sounds like a lot, but within a day it becomes second nature.

The power button: Usually a circle with a line through it — the universal symbol for “on/off” that someone decided was intuitive. Press it once to turn on. Press it once while on to put it to sleep. Hold it down as a last resort to force it off. This is the nuclear option and should be used sparingly.

Ports and sockets: These are the little holes on the sides or back of your computer. USB ports (rectangular) are where you plug in memory sticks, mice, keyboards, and charging cables. HDMI ports (trapezoid-shaped) connect to TVs or external screens. The headphone jack is the small round one. They all only go in one way — if it’s not going in easily, flip it over and try again. This applies to USB more than anything else in human history.

Turning It On for the First Time

Kate takes a deep breath. She presses the power button. The screen glows to life.

If it’s a brand new computer, it will walk you through some initial setup — choosing your language, connecting to Wi-Fi, and creating an account. Take your time with this. There’s no timer. Nobody is judging you. Read each screen before clicking “Next.”

If it’s a second-hand or older computer, you’ll probably just be asked to log in with a username and password. If you’ve forgotten the password before you’ve even started, don’t panic — there are reset options, which we’ll cover shortly.

Part 2: The Desktop — Your Digital Living Room

Once your computer starts up, you’ll see the desktop. This is your home base. Think of it as your desk — except instead of coffee rings and old receipts, it has icons and a taskbar.

What’s on the Desktop?

Icons are small pictures that represent programs, files, or folders. Double-clicking one opens it. You can drag them around to organise them however you like. Kate put all her icons in a neat row along the left side. Kate is doing brilliantly.

The taskbar (on Windows) or Dock (on Mac) runs along the bottom of the screen. It shows you which programs are open and gives you quick access to favourites. The little icons pinned there are shortcuts — click once to open the program.

The Start Menu (Windows) or Apple Menu (Mac) is your gateway to everything on the computer. On Windows, click the Windows logo in the bottom-left corner. On Mac, click the Apple logo in the top-left. From here you can find any program, adjust settings, or shut the computer down properly.

The clock and system tray live in the bottom-right corner (Windows) and show the time, Wi-Fi status, battery level, and other useful indicators. If a little red X appears on the Wi-Fi symbol, you’re not connected to the internet. More on that in a moment.

Opening and Closing Programs

Programs (also called “applications” or “apps”) are the tools you use on your computer. A web browser lets you visit websites. A word processor lets you write documents. A music player plays music. You get the idea.

To open a program, double-click its icon, or find it in the Start Menu and click once. The program will open in a window — a rectangular box on your screen.

Every window has three buttons in the top corner (top-right on Windows, top-left on Mac):

The X closes the window and the program entirely.

The square/box icon maximises the window to fill the whole screen, or restores it to a smaller size.

The minus/dash icon minimises the window — it disappears from view but is still running. You’ll see it in your taskbar. Click it there to bring it back.

Kate minimised a window by accident on day one and spent twenty minutes convinced she’d deleted something. She hadn’t. This happens to everyone.

Working with Multiple Windows

You can have many programs open at once. Your web browser, a document, and a music app can all run simultaneously. To switch between them, click on the relevant program in your taskbar at the bottom of the screen, or click anywhere on a visible window to bring it to the front.

One genuinely useful trick: pressing Alt + Tab (Windows) or Command + Tab (Mac) lets you cycle through your open programs quickly. Hold Alt (or Command) and keep pressing Tab to move through them. Release when you reach the one you want. Tech people use this constantly and it never stops feeling efficient.

Part 3: Files and Folders — Where Does Everything Live?

This is where many new users get confused, so let’s tackle it head on.

Understanding Files

Everything stored on your computer is a file. A document you write is a file. A photo you take is a file. A song you download is a file. Files have names and extensions — the bit after the dot that tells the computer what type of file it is.

Common file types Kate will encounter:

.docx — A Microsoft Word document. This is where you write letters, essays, and strongly worded complaints to local councillors.

.pdf — A Portable Document Format file. These look the same on every computer and device, which is why banks, businesses, and governments love them. You can read PDFs but not easily edit them (unless you have special software).

.jpg or .png — Image files. Photos are usually JPGs. Logos and graphics with transparent backgrounds are often PNGs.

.mp3 or .mp4 — Audio and video files respectively.

.xlsx — A Microsoft Excel spreadsheet. Numbers, tables, and the source of mild dread for many.

Understanding Folders

Folders are containers for files. They work exactly like physical folders in a filing cabinet — you put related files together so you can find them later. Folders can contain other folders, creating a neat hierarchy.

Kate has a folder called “Important Documents.” Inside it she has folders called “Work,” “Bills,” and “Recipes.” Inside “Recipes” she has a file called “Mum’s Lasagne.docx.” This is an excellent system and Kate should be very proud.

File Explorer and Finder

On Windows, File Explorer (the folder icon in your taskbar) is where you browse all your files and folders. On Mac, it’s called Finder and lives in the Dock. Think of it as the map of your computer’s storage.

The left panel shows quick links to common locations:

Desktop — Files sitting on your desktop background.

Documents — The recommended place to save most files.

Downloads — Where files go when you download them from the internet. This folder fills up faster than you’d expect.

Pictures — For photos and images.

This PC / My Computer — Shows all storage drives connected to your computer.

Saving Files — The Most Important Habit You’ll Ever Develop

Save your work. Save it early. Save it often. Save it like your life depends on it, because your afternoon’s work sometimes does.

To save a file, press Ctrl + S (Windows) or Command + S (Mac). Do this every few minutes when working on something important. It takes less than a second and prevents the heartbreak of losing two hours of careful typing because the power went out.

When you save a file for the first time, a box will appear asking you to give it a name and choose where to save it. Pick something descriptive (“Letter to Dentist March 2026” is better than “Document1”) and save it somewhere sensible like your Documents folder.

Save As (Ctrl + Shift + S, or File menu → Save As) lets you save a copy of a file with a new name or in a different location. Useful when you want to keep the original and make changes to a new version.

Copying, Moving, and Deleting Files

Right-clicking on any file gives you a menu of options. From here you can:

Copy — Creates a duplicate. The original stays where it is.

Cut — Prepares the file to be moved. The original will disappear once you paste it somewhere else.

Paste — Places a copied or cut file in a new location. Navigate to where you want it, right-click on empty space, and select Paste. Or use Ctrl+V.

Delete — Sends the file to the Recycle Bin (Windows) or Trash (Mac). It’s not permanently deleted yet — it sits there until you “empty” the bin. This is your safety net.

Rename — Lets you give the file a new name. Click once on a file to select it, then press F2 (Windows) or press Enter (Mac) to rename it.

Kate accidentally deleted a folder once and recovered it by opening the Recycle Bin, right-clicking the folder, and selecting “Restore.” She felt like a hacker. She was not a hacker. She was a woman who knew where the Recycle Bin was, which is arguably better.

Part 4: Getting Online — The Whole Point, Really

Connecting to Wi-Fi

Wi-Fi is wireless internet. Your home router broadcasts a Wi-Fi signal that your computer can connect to, giving you access to the internet without any cables.

To connect on Windows, click the Wi-Fi icon in the bottom-right corner of your taskbar (it looks like rising signal bars or a globe if not connected). A list of available networks appears. Click your home network’s name — this is called the SSID and is usually printed on a sticker on your router. Enter the password (also on the sticker, usually a long string of random characters). Click Connect. Done.

On Mac, click the Wi-Fi icon in the top-right menu bar. Same process.

Once connected, your computer remembers the network and reconnects automatically in future. If your internet ever seems to stop working, the classic first step is: turn the router off, wait 30 seconds, turn it back on. This solves roughly 60% of all home internet problems. The other 40% involves calling your internet provider and listening to hold music.

Using a Web Browser

A web browser is the program you use to visit websites. Common ones include:

Google Chrome — The most popular browser. Fast, works everywhere, made by Google.

Microsoft Edge — Built into Windows. Perfectly good, unfairly ignored.

Mozilla Firefox — Excellent, privacy-focused, beloved by people who use the word “privacy-focused.”

Safari — Built into Macs and iPhones. Sleek, efficient, slightly exclusive.

They all do the same fundamental thing: they take you to websites. Kate uses Chrome, which is fine. All of these are fine.

Navigating the Browser

At the top of your browser is the address bar — a long box where you type website addresses (called URLs). Every website address starts with https:// (though you don’t need to type that part), followed by the site name. For example: www.bbc.co.uk or www.google.com.

Press Enter after typing an address and the browser will take you there.

You can also just type what you’re looking for directly into the address bar — “best pasta recipe” or “local GP near me” — and the browser will use a search engine to find relevant results. This is probably how most people use browsers ninety percent of the time.

Key browser buttons to know:

Back arrow (←) — Goes to the previous page.

Forward arrow (→) — Goes forward again after going back.

Refresh button (↺) — Reloads the current page. Useful if a page hasn’t loaded properly.

Home button — Returns to your browser’s start page.

The X next to the loading spinner — Stops a page from loading. Useful if something is taking too long.

Tabs — The Browser’s Best Feature

Tabs let you have multiple websites open at the same time within one browser window. Each tab appears as a labelled strip along the top of the browser.

To open a new tab: press Ctrl + T (Windows) or Command + T (Mac), or click the little + button next to your existing tabs.

To close a tab: click the X on it, or press Ctrl + W / Command + W.

Accidentally closed a tab? Press Ctrl + Shift + T (Windows) or Command + Shift + T (Mac) to bring it back. This is one of the most-used keyboard shortcuts in existence.

Kate currently has 47 tabs open. This is not recommended. Three to five is civilised. Anything above ten and your computer starts to wheeze.

Search Engines — How to Find Anything

A search engine is a tool that indexes the internet and finds relevant results based on what you type. Google is the most popular by an enormous margin, but Bing, DuckDuckGo, and others exist.

Good search habits make a huge difference:

Be specific. “Chicken pie recipe easy shortcrust pastry” will serve you better than “pie.”

Use quotation marks to search for an exact phrase: “chicken and leek pie” will only show results containing those words in that order.

Add a location for local results: “dentists accepting new patients Manchester.”

Add “how to” for instructions: “how to change a duvet cover without losing your mind.”

Add the current year for recent information: “best antivirus software 2026.”

Not everything in search results is true or trustworthy. We’ll address that thoroughly in the internet safety section, because it matters enormously.

Part 5: Email — Still the Backbone of the Internet

Setting Up an Email Account

Email (electronic mail) is how most official communication happens online — from banks, doctors, online shops, government services, and the occasional newsletter you signed up for in 2019 and have been meaning to unsubscribe from ever since.

The most popular free email providers are:

Gmail (Google) — go to gmail.com and click “Create account.”

Outlook / Hotmail (Microsoft) — go to outlook.com.

Yahoo Mail — go to mail.yahoo.com.

When choosing an email address, use something professional and identifiable — [email protected] is better than [email protected] for anything official, though the latter has undeniable character.

Reading, Writing, and Replying to Emails

Your email inbox shows a list of received messages. Click one to read it. Unread messages are usually shown in bold.

To write a new email, click the “Compose” or “New Email” button (usually prominent and hard to miss). A window will appear with:

To: — Type the recipient’s email address here. Every email address has an @ symbol in it (e.g. [email protected]).

Subject: — A brief summary of what the email is about. “Quick question about Thursday” is more useful than leaving it blank.

Body: — The main message. Type here.

When you’re done, click Send. The email will arrive in the recipient’s inbox almost instantly, regardless of whether they’re next door or on another continent. This still feels faintly miraculous if you think about it.

Reply responds to the sender of an email you’ve received.

Reply All responds to everyone on the email, including anyone CC’d. Use this cautiously. Many workplace embarrassments have originated from an ill-judged Reply All.

Forward sends the email (and its history) to someone new.

Attachments

Attachments are files sent alongside an email — a document, photo, or PDF. To attach a file, click the paperclip icon when composing an email, then browse to find the file on your computer and select it.

To open an attachment you’ve received, click on it in the email. Be cautious with attachments from people you don’t know — this is something we’ll return to in the safety section, and it’s important.

Organising Your Inbox

Emails pile up fast. Left unmanaged, your inbox becomes a digital junk drawer. A few habits keep it manageable:

Create folders (or “labels” in Gmail) to file emails by category — Work, Family, Bills, Shopping, etc. Most email services let you right-click an email to move it to a folder.

Unsubscribe from newsletters and marketing emails you never read. There’s usually an “Unsubscribe” link at the very bottom of these emails, often in tiny text. Clicking it should remove you from their mailing list within a day or two.

Use the spam/junk folder wisely. Your email service automatically filters obvious junk here. Check it occasionally as legitimate emails sometimes land there by mistake, then mark them as “Not Spam” to train the filter.

Delete what you don’t need. Storing ten years of old emails uses storage space and makes finding things harder.

Part 6: Passwords — Your First Line of Defence

Here’s where things get serious — but don’t worry, Kate, we’ll keep it friendly.

Why Passwords Matter

Passwords protect your accounts. Your email, your bank, your shopping accounts, your social media — all of them sit behind a password. If someone else gets your password, they can access your account, impersonate you, spend your money, or steal your personal information.

Cybercriminals try to crack passwords every day. They use sophisticated programs that test millions of combinations per second. They also buy leaked password lists from previous data breaches and try those against other services. This is why your passwords matter more than you might think.

What Makes a Strong Password?

A strong password is:

Long — At least 12 characters, ideally more. Length matters more than complexity.

Unique — Different for every account. This is non-negotiable.

Unpredictable — Not your name, birthday, pet’s name, or any word in the dictionary.

The best approach is a passphrase — a string of random words strung together. Something like PurpleTrampolineFishWhistle is genuinely more secure than P@ssw0rd!, despite looking far less impressive. Length beats complexity every time.

Common passwords to absolutely never use:

123456 | password | qwerty | letmein | abc123 | your name | your birthday | your pet’s name | your child’s name

These are the first things attackers try. They’re in every “most used passwords” list published annually, which is both understandable and a bit heartbreaking.

Using a Password Manager

Here’s Kate’s problem: she has twenty accounts and is supposed to have a different strong password for every one. Nobody can memorise twenty random passphrases.

The solution is a password manager — a program that stores all your passwords securely, locked behind one master password that only you know. You only need to remember one password. The manager remembers the rest and can generate strong new ones for you automatically.

Recommended password managers:

Bitwarden — Free, open-source, excellent. This is the one Kate should use.

1Password — Paid but polished and well-regarded.

Dashlane — Good free tier with useful features.

The one built into your browser — Chrome, Firefox, and Edge all have built-in password managers that are decent and very convenient.

Write your master password down and store it somewhere physically secure — a locked drawer, a safe, somewhere you won’t lose it. If you forget the master password you lose access to everything. This is the one you cannot afford to forget.

Two-Factor Authentication (2FA) — The Second Lock on the Door

Two-factor authentication (2FA) means that even if someone has your password, they still can’t get into your account without a second proof of identity — usually a code sent to your phone, or generated by an app.

Think of it like a bank card: the card is your password, the PIN is your second factor. Both are needed.

Enable 2FA on every account that offers it, especially:

Your email account (this is the most important one)

Your bank and financial accounts

Any account linked to payment details

Social media accounts

To enable it, look in your account’s Settings or Security section for “Two-factor authentication,” “Two-step verification,” or “Login verification.” It will walk you through the setup. It takes about five minutes and dramatically improves your security.

Part 7: Staying Safe Online — The Bit That Really Matters

This is the heart of the whole guide. Everything else makes you competent. This part keeps you safe.

Phishing — Don’t Take the Bait

Phishing (pronounced “fishing” — yes, really) is when criminals send fake emails, texts, or messages pretending to be someone trustworthy in order to trick you into giving them your personal information, clicking a malicious link, or transferring money.

These messages pretend to be from your bank, from Royal Mail about a missed delivery, from HMRC about a tax refund, from Amazon about a suspicious order, or from a friend whose account has been hacked. They look incredibly convincing. They’re designed to.

Warning signs of a phishing attempt:

Urgency — “Your account will be closed in 24 hours!” Legitimate organisations rarely create panic deadlines.

Unexpected contact — You weren’t expecting a message from your bank. Be suspicious.

Suspicious email addresses — The email might say it’s from Barclays but the actual address is [email protected] or similar. Check the sender’s actual address, not just the display name.

Poor spelling and grammar — Not always present in modern phishing (attackers have improved), but still a red flag.

Generic greetings — “Dear Customer” instead of your actual name.

Suspicious links — Hover your mouse over any link before clicking it. The actual web address it points to will appear at the bottom of your screen. If it looks strange or doesn’t match who supposedly sent it, don’t click.

Kate’s golden rule: When in doubt, don’t click. If you think an email might be genuine, go directly to the company’s website by typing the address yourself — never follow a link in an email you’re unsure about. Then log in and check if there’s actually a problem.

If you receive a suspicious email, you can report it in the UK by forwarding it to [email protected]. In the US, forward it to [email protected]. Then delete it.

Scam Websites

Not every website is what it claims to be. Fake websites are designed to look identical to legitimate ones — your bank, online shops, government portals — to steal your login details or payment information.

How to spot a legitimate website:

HTTPS and the padlock: Look at your browser’s address bar. A secure website starts with https:// (not just http://) and shows a padlock icon. Click the padlock for more information about the site’s security certificate. This doesn’t guarantee a site is legitimate — scammers can get HTTPS certificates too — but a site without it should definitely be avoided for anything involving personal data or payments.

Check the address carefully: Scam sites use addresses like www.amazon-secure-login.com or www.amaz0n.com (with a zero instead of an O). The real Amazon is at www.amazon.co.uk or www.amazon.com. Look for these subtle substitutions.

Contact information: Legitimate businesses have clear contact details, registered addresses, and typically a phone number. If a shop’s website has no contact page or only a generic email form, that’s a flag.

Trust your instincts: If a deal looks unbelievably good or a website feels slightly off, listen to that feeling. The internet version of “if it seems too good to be true, it probably is” applies here with full force.

Safe Online Shopping

Online shopping is one of the great conveniences of modern life and completely safe when done carefully. Kate shops online regularly. Here’s how she does it safely:

Stick to well-known retailers where possible (Amazon, John Lewis, Next, M&S, Boots, etc.). For smaller or unfamiliar shops, look for reviews on independent review sites like Trustpilot. Search for the shop’s name plus “reviews” or “scam” to see what others have experienced.

Pay by credit card where possible, or use PayPal. Credit card payments offer strong consumer protection — if goods don’t arrive or aren’t as described, your card company can reverse the charge (called a “chargeback”). Debit cards offer less protection. Bank transfers offer almost none at all. Never pay a stranger by bank transfer for goods.

Never save your card details on websites you don’t fully trust. Even on reputable sites, consider whether the convenience of saved details is worth the risk if the company ever suffers a data breach.

Check the returns policy before buying. Reputable retailers make it easy to return items. Vague or non-existent returns policies are a warning sign.

Social Media Safety

Social media platforms (Facebook, Instagram, X/Twitter, TikTok, LinkedIn, and many others) let you connect and share with others. They’re wonderful — and they require care.

Privacy settings matter. Most social media platforms default to sharing your posts publicly — meaning anyone, anywhere in the world, can see them. Review your privacy settings and consider restricting your posts to friends only, especially if you share personal information, photos of your home or children, or holiday plans (which effectively broadcast “our house is empty”).

Think before you post. Once something is on the internet it can be very hard to remove, even after deletion. Screenshots exist. Posts go viral. Future employers, landlords, and family members may one day see what you share today. Not to induce paranoia — share freely and joyfully — just be conscious of it.

Be cautious of strangers. Friend requests and follow requests from people you don’t recognise can be genuine, or can be fake accounts built to gather information about you. Don’t accept requests from people you don’t know, and be especially cautious about anyone who quickly becomes overly familiar or starts asking personal questions or requesting money.

Romance scams deserve specific mention because they cause enormous financial and emotional damage. Criminals create fake profiles, build trust over weeks or months, then invent crises requiring money. If someone you’ve met only online — however long you’ve been talking — asks you for money, that is a scam. Always. Without exception.

Software Updates — Not an Inconvenience, a Necessity

That little pop-up telling you an update is available for Windows, your browser, or your apps? Don’t dismiss it. Updates frequently contain security patches — fixes for vulnerabilities that attackers are actively trying to exploit. An unpatched computer is a computer with known unlocked doors.

Enable automatic updates wherever possible. Let Windows update overnight. Keep your browser and apps up to date. It takes minimal effort and makes an enormous difference to your security.

Antivirus Software — Your Digital Immune System

Antivirus software monitors your computer for malicious programs (malware, viruses, ransomware) and either prevents them from installing or removes them once found.

The good news: Windows computers come with Windows Defender built in and it’s genuinely good. For most home users it’s entirely sufficient, provided it stays updated (it does so automatically).

If you want additional protection, reputable paid options include Bitdefender, Norton, and Kaspersky (though note Kaspersky has faced scrutiny in some countries over its Russian origins — check current guidance). Free options include Avast and AVG, though their free tiers come with persistent upselling.

What antivirus software cannot protect you from: your own decisions. If you click a phishing link, hand over your password, or deliberately download suspicious software, no antivirus can reliably save you. The most important security layer is always the person sitting in front of the keyboard.

Public Wi-Fi — Useful but Risky

Free Wi-Fi in coffee shops, hotels, airports, and libraries is genuinely useful. It’s also worth being careful with.

On public Wi-Fi, other people on the same network can potentially intercept data you send and receive if it’s not encrypted. Most modern websites use HTTPS (look for that padlock), which encrypts your data and makes interception very difficult. But it’s still wise to:

Avoid accessing your bank or making financial transactions on public Wi-Fi.

Not enter passwords on public Wi-Fi if you can help it — wait until you’re on your secure home network.

Consider a VPN (Virtual Private Network) if you use public Wi-Fi regularly. A VPN encrypts all your internet traffic, making it essentially unreadable to anyone trying to intercept it. Reputable paid VPNs include Mullvad, ProtonVPN, and ExpressVPN.

Backing Up Your Files — Plan for the Worst

Computers fail. Hard drives die without warning. Ransomware encrypts your files and demands payment for their return. Laptops get stolen. Accidents happen. Kate once spilled an entire cup of tea on her laptop (she is fine; the laptop is not).

A backup means that when (not if) something goes wrong, you don’t lose everything.

The gold standard is the 3-2-1 rule:

3 copies of your data.

2 different types of storage (e.g. computer + external drive).

1 copy offsite (e.g. in the cloud).

In practice, for a home user, this means:

An external hard drive — a portable storage device you plug in via USB and copy your important files to regularly. Drives with 1TB of storage cost very little and hold an enormous amount. Set up Windows Backup or Mac Time Machine to do this automatically.

A cloud backup service — services like OneDrive (built into Windows), iCloud (built into Macs), or Google Drive automatically sync your files to remote servers. If your house burns down (extreme, but possible), your files survive.

Back up regularly. Check occasionally that your backups have actually worked by trying to open a backed-up file. A backup you’ve never tested is a backup you can’t fully trust.

Part 8: Essential Keyboard Shortcuts Kate Should Know

You’ve made it this far. You deserve a useful cheat sheet.

Ctrl + C (Windows) / Command + C (Mac) — Copy selected text or file.

Ctrl + X / Command + X — Cut (copy and remove original).

Ctrl + V / Command + V — Paste.

Ctrl + Z / Command + Z — Undo the last action. This is wonderful. Use it freely.

Ctrl + S / Command + S — Save. Do this constantly.

Ctrl + A / Command + A — Select all text or files in a window.

Ctrl + F / Command + F — Find. Opens a search box to find text on a page or in a document.

Ctrl + P / Command + P — Print.

Ctrl + T / Command + T — New browser tab.

Ctrl + W / Command + W — Close current tab or window.

Ctrl + Shift + T / Command + Shift + T — Reopen last closed tab.

Alt + Tab / Command + Tab — Switch between open programs.

Windows key + L / Command + Control + Q — Lock your computer. Do this whenever you walk away from it in a public place.

F11 (Windows) / Command + Shift + F (Chrome) — Full screen browser mode. F11 again to exit.

Ctrl + + (plus) / Command + + — Zoom in. Useful for small text.

Ctrl + – (minus) / Command + – — Zoom out.

Ctrl + 0 / Command + 0 — Reset zoom to normal.

Part 9: When Things Go Wrong (And They Will)

Every computer user encounters problems. Every single one. The difference between a confident user and a panicked one is knowing that most problems are solvable — and knowing the first steps to take.

The Computer is Frozen

Sometimes a program stops responding and the cursor won’t move. Wait 30 seconds first — the computer may just be thinking very hard. If nothing changes:

On Windows: Press Ctrl + Alt + Delete. Select “Task Manager.” Find the unresponsive program in the list, click it, and click “End Task.”

On Mac: Press Command + Option + Escape. Select the unresponsive app and click “Force Quit.”

If nothing works: Hold down the power button for 5-10 seconds to force a shutdown. Then restart. Unsaved work may be lost, which is why Ctrl+S is your best friend.

The Computer is Slow

A sluggish computer is usually caused by too many programs running at once, too little free storage space, or an outdated operating system. First steps:

Close programs you’re not using.

Restart the computer. Many people leave computers on for weeks without restarting. A fresh restart clears temporary files and memory.

Check your storage — if your hard drive is more than 85% full, performance suffers. Delete old files or move them to an external drive.

Run a malware scan with your antivirus software.

Make sure Windows/macOS updates are installed.

The Internet Isn’t Working

Step one: Is it just one website, or all websites? Try visiting a few different ones.

Step two: Is it just your computer, or all devices? Try another phone or tablet.

Step three: Restart your router. Unplug it, wait 30 seconds, plug back in. Wait two minutes for it to reconnect fully.

Step four: Restart your computer.

Step five: Call your internet provider.

These five steps resolve the vast majority of home internet problems in the stated order.

You’ve Forgotten a Password

This happens to everyone, including the people who built the systems.

Click “Forgot password?” or “Reset password” on the login page. You’ll usually be sent a reset link to your email address. If you’ve lost access to your email account, look for account recovery options — usually involving a backup phone number, backup email address, or security questions you set up when creating the account.

This is why having a recovery email or phone number set up on your important accounts is essential. Check yours now if you’re not sure.

You Think You’ve Been Hacked

Signs your account may have been compromised: you can’t log in with your usual password, you receive emails about password changes you didn’t make, your contacts receive messages you didn’t send, or you notice unfamiliar account activity.

Act immediately:

1. Try to regain access using the account recovery process.

2. Once in, change your password immediately to something strong and unique.

3. Enable two-factor authentication if you haven’t already.

4. Check connected apps and remove anything unfamiliar.

5. Check whether your email is listed on haveibeenpwned.com — a free, legitimate service that tells you if your details have appeared in any known data breaches.

6. If a financial account is involved, contact your bank immediately.

Part 10: Where to Learn More

Kate has come a long way. From not knowing which end to plug in, to understanding phishing emails, two-factor authentication, and why Ctrl+Z might be the best thing ever invented. She should feel genuinely proud.

But learning doesn’t stop here. Technology changes constantly, and staying curious keeps you safe and capable. Here are excellent free resources to continue learning:

Get Safe Online (getsafeonline.org) — Free, comprehensive, UK-focused internet safety advice for individuals and businesses. Practical, clear, and regularly updated.

Cyber Aware (cyberaware.gov.uk) — The UK Government’s official cybersecurity advice for the public. Covers passwords, updates, backups, and more in plain English.

Have I Been Pwned (haveibeenpwned.com) — Check whether your email addresses appear in known data breaches. Free, legitimate, and genuinely useful.

GCFGlobal (gcfglobal.org) — Free tutorials on basic computing, internet use, Microsoft Office, Google tools, and more. Excellent for complete beginners.

BBC WebWise — The BBC’s digital skills resources, designed specifically for people new to computers and the internet.

Your local library — Many libraries offer free digital skills classes run by patient, helpful people in person. Check your local council’s website for details.

Final Word

Computers are tools. Like any tool, they serve whoever knows how to use them. There’s nothing in this guide that requires technical talent or special intelligence — just patience, practice, and the willingness to occasionally click the wrong thing and learn from it.

Kate started this guide not knowing which end to plug in. She now knows how to save files, send emails, shop safely, create strong passwords, spot a phishing email, and bring back that tab she accidentally closed. She might even have fewer than forty-seven tabs open. Progress.

You’ve made it too. Welcome to the internet. It’s chaotic, wonderful, occasionally baffling, and — handled carefully — remarkably safe.

Now go and change your passwords. You know you should.

Leave a Reply

Your email address will not be published. Required fields are marked *

WordPress Appliance - Powered by TurnKey Linux