{"id":32,"date":"2026-03-01T12:00:00","date_gmt":"2026-03-01T12:00:00","guid":{"rendered":"https:\/\/yourblog.com\/?p=32"},"modified":"2026-03-01T12:00:00","modified_gmt":"2026-03-01T12:00:00","slug":"kates-complete-guide-to-computers","status":"publish","type":"post","link":"http:\/\/iamglover.com\/?p=32","title":{"rendered":"Kate&#8217;s Complete Guide to Computers: From &#8220;Which End Do I Plug In?&#8221; to Staying Safe Online"},"content":{"rendered":"<p><strong>Meet Kate. Kate is smart, capable, and recently the proud owner of a brand-new computer. Kate has successfully assembled flat-pack furniture, raised children, and once navigated a roundabout in France without GPS. She can absolutely do this. And so can you.<\/strong><\/p>\n<p>This guide is for everyone who has ever stared at a computer like it owes them money. We&#8217;ll start from the very beginning \u2014 no jargon, no judgement \u2014 and work our way up to keeping you safe online. By the end, you&#8217;ll feel confident, competent, and maybe just a little smug at family gatherings.<\/p>\n<p>Let&#8217;s begin.<\/p>\n<h2>Part 1: Meeting Your Computer (It Won&#8217;t Bite)<\/h2>\n<h3>What Even Is a Computer?<\/h3>\n<p>A computer is an electronic device that processes information. Think of it as an incredibly fast, incredibly literal assistant that does exactly what you tell it \u2014 which sounds wonderful until you realise you accidentally told it to delete something important. We&#8217;ll cover that.<\/p>\n<p>There are a few main types you&#8217;ll encounter:<\/p>\n<p><strong>Desktop computers<\/strong> sit on (or under) a desk. They have a separate screen, keyboard, and a big box called a &#8220;tower&#8221; or &#8220;case&#8221; that does all the actual thinking. They&#8217;re powerful, good value, and completely immovable. Perfect if you like your technology to stay put.<\/p>\n<p><strong>Laptops<\/strong> are portable computers with everything built in \u2014 screen, keyboard, and brain all in one slim package. Kate has a laptop, which means she can work from the sofa, the kitchen table, or technically a beach, though sandy keyboards are nobody&#8217;s friend.<\/p>\n<p><strong>Tablets<\/strong> (like iPads) are mostly touchscreen and brilliant for browsing, reading, and watching videos. They&#8217;re what happens when a laptop goes on a diet.<\/p>\n<p>For this guide, we&#8217;ll assume you&#8217;re using a laptop or desktop, but most of this applies everywhere.<\/p>\n<h3>The Parts of Your Computer: A Friendly Tour<\/h3>\n<p>Before Kate can do anything useful, she needs to know what she&#8217;s looking at. Here&#8217;s the cast of characters:<\/p>\n<p><strong>The screen (monitor):<\/strong> This is where everything happens visually. If nothing appears on it, the computer isn&#8217;t on. Or the brightness is down. Both are surprisingly common.<\/p>\n<p><strong>The keyboard:<\/strong> Your main way of typing text and giving commands. Those mysterious keys like &#8220;Ctrl,&#8221; &#8220;Alt,&#8221; and &#8220;Fn&#8221; do genuinely useful things \u2014 we&#8217;ll get to them. The &#8220;any key&#8221; that old instructions told you to press? There isn&#8217;t one. They meant any key. Chaos, frankly.<\/p>\n<p><strong>The mouse or trackpad:<\/strong> This controls a little arrow on screen called the cursor. You move the mouse on a flat surface (desktop) or drag your finger on the trackpad (laptop) to move the cursor. You then click to select things. Left click selects or opens. Right click gives you a menu of options. Double click opens things. It sounds like a lot, but within a day it becomes second nature.<\/p>\n<p><strong>The power button:<\/strong> Usually a circle with a line through it \u2014 the universal symbol for &#8220;on\/off&#8221; that someone decided was intuitive. Press it once to turn on. Press it once while on to put it to sleep. Hold it down as a last resort to force it off. This is the nuclear option and should be used sparingly.<\/p>\n<p><strong>Ports and sockets:<\/strong> These are the little holes on the sides or back of your computer. USB ports (rectangular) are where you plug in memory sticks, mice, keyboards, and charging cables. HDMI ports (trapezoid-shaped) connect to TVs or external screens. The headphone jack is the small round one. They all only go in one way \u2014 if it&#8217;s not going in easily, flip it over and try again. This applies to USB more than anything else in human history.<\/p>\n<h3>Turning It On for the First Time<\/h3>\n<p>Kate takes a deep breath. She presses the power button. The screen glows to life.<\/p>\n<p>If it&#8217;s a brand new computer, it will walk you through some initial setup \u2014 choosing your language, connecting to Wi-Fi, and creating an account. Take your time with this. There&#8217;s no timer. Nobody is judging you. Read each screen before clicking &#8220;Next.&#8221;<\/p>\n<p>If it&#8217;s a second-hand or older computer, you&#8217;ll probably just be asked to log in with a username and password. If you&#8217;ve forgotten the password before you&#8217;ve even started, don&#8217;t panic \u2014 there are reset options, which we&#8217;ll cover shortly.<\/p>\n<h2>Part 2: The Desktop \u2014 Your Digital Living Room<\/h2>\n<p>Once your computer starts up, you&#8217;ll see the <strong>desktop<\/strong>. This is your home base. Think of it as your desk \u2014 except instead of coffee rings and old receipts, it has icons and a taskbar.<\/p>\n<h3>What&#8217;s on the Desktop?<\/h3>\n<p><strong>Icons<\/strong> are small pictures that represent programs, files, or folders. Double-clicking one opens it. You can drag them around to organise them however you like. Kate put all her icons in a neat row along the left side. Kate is doing brilliantly.<\/p>\n<p><strong>The taskbar<\/strong> (on Windows) or <strong>Dock<\/strong> (on Mac) runs along the bottom of the screen. It shows you which programs are open and gives you quick access to favourites. The little icons pinned there are shortcuts \u2014 click once to open the program.<\/p>\n<p><strong>The Start Menu<\/strong> (Windows) or <strong>Apple Menu<\/strong> (Mac) is your gateway to everything on the computer. On Windows, click the Windows logo in the bottom-left corner. On Mac, click the Apple logo in the top-left. From here you can find any program, adjust settings, or shut the computer down properly.<\/p>\n<p><strong>The clock and system tray<\/strong> live in the bottom-right corner (Windows) and show the time, Wi-Fi status, battery level, and other useful indicators. If a little red X appears on the Wi-Fi symbol, you&#8217;re not connected to the internet. More on that in a moment.<\/p>\n<h3>Opening and Closing Programs<\/h3>\n<p>Programs (also called &#8220;applications&#8221; or &#8220;apps&#8221;) are the tools you use on your computer. A web browser lets you visit websites. A word processor lets you write documents. A music player plays music. You get the idea.<\/p>\n<p>To open a program, double-click its icon, or find it in the Start Menu and click once. The program will open in a <strong>window<\/strong> \u2014 a rectangular box on your screen.<\/p>\n<p>Every window has three buttons in the top corner (top-right on Windows, top-left on Mac):<\/p>\n<p>The <strong>X<\/strong> closes the window and the program entirely.<\/p>\n<p>The <strong>square\/box icon<\/strong> maximises the window to fill the whole screen, or restores it to a smaller size.<\/p>\n<p>The <strong>minus\/dash icon<\/strong> minimises the window \u2014 it disappears from view but is still running. You&#8217;ll see it in your taskbar. Click it there to bring it back.<\/p>\n<p>Kate minimised a window by accident on day one and spent twenty minutes convinced she&#8217;d deleted something. She hadn&#8217;t. This happens to everyone.<\/p>\n<h3>Working with Multiple Windows<\/h3>\n<p>You can have many programs open at once. Your web browser, a document, and a music app can all run simultaneously. To switch between them, click on the relevant program in your taskbar at the bottom of the screen, or click anywhere on a visible window to bring it to the front.<\/p>\n<p>One genuinely useful trick: pressing <strong>Alt + Tab<\/strong> (Windows) or <strong>Command + Tab<\/strong> (Mac) lets you cycle through your open programs quickly. Hold Alt (or Command) and keep pressing Tab to move through them. Release when you reach the one you want. Tech people use this constantly and it never stops feeling efficient.<\/p>\n<h2>Part 3: Files and Folders \u2014 Where Does Everything Live?<\/h2>\n<p>This is where many new users get confused, so let&#8217;s tackle it head on.<\/p>\n<h3>Understanding Files<\/h3>\n<p>Everything stored on your computer is a <strong>file<\/strong>. A document you write is a file. A photo you take is a file. A song you download is a file. Files have names and <strong>extensions<\/strong> \u2014 the bit after the dot that tells the computer what type of file it is.<\/p>\n<p>Common file types Kate will encounter:<\/p>\n<p><strong>.docx<\/strong> \u2014 A Microsoft Word document. This is where you write letters, essays, and strongly worded complaints to local councillors.<\/p>\n<p><strong>.pdf<\/strong> \u2014 A Portable Document Format file. These look the same on every computer and device, which is why banks, businesses, and governments love them. You can read PDFs but not easily edit them (unless you have special software).<\/p>\n<p><strong>.jpg or .png<\/strong> \u2014 Image files. Photos are usually JPGs. Logos and graphics with transparent backgrounds are often PNGs.<\/p>\n<p><strong>.mp3 or .mp4<\/strong> \u2014 Audio and video files respectively.<\/p>\n<p><strong>.xlsx<\/strong> \u2014 A Microsoft Excel spreadsheet. Numbers, tables, and the source of mild dread for many.<\/p>\n<h3>Understanding Folders<\/h3>\n<p>Folders are containers for files. They work exactly like physical folders in a filing cabinet \u2014 you put related files together so you can find them later. Folders can contain other folders, creating a neat hierarchy.<\/p>\n<p>Kate has a folder called &#8220;Important Documents.&#8221; Inside it she has folders called &#8220;Work,&#8221; &#8220;Bills,&#8221; and &#8220;Recipes.&#8221; Inside &#8220;Recipes&#8221; she has a file called &#8220;Mum&#8217;s Lasagne.docx.&#8221; This is an excellent system and Kate should be very proud.<\/p>\n<h3>File Explorer and Finder<\/h3>\n<p>On Windows, <strong>File Explorer<\/strong> (the folder icon in your taskbar) is where you browse all your files and folders. On Mac, it&#8217;s called <strong>Finder<\/strong> and lives in the Dock. Think of it as the map of your computer&#8217;s storage.<\/p>\n<p>The left panel shows quick links to common locations:<\/p>\n<p><strong>Desktop<\/strong> \u2014 Files sitting on your desktop background.<\/p>\n<p><strong>Documents<\/strong> \u2014 The recommended place to save most files.<\/p>\n<p><strong>Downloads<\/strong> \u2014 Where files go when you download them from the internet. This folder fills up faster than you&#8217;d expect.<\/p>\n<p><strong>Pictures<\/strong> \u2014 For photos and images.<\/p>\n<p><strong>This PC \/ My Computer<\/strong> \u2014 Shows all storage drives connected to your computer.<\/p>\n<h3>Saving Files \u2014 The Most Important Habit You&#8217;ll Ever Develop<\/h3>\n<p>Save your work. Save it early. Save it often. Save it like your life depends on it, because your afternoon&#8217;s work sometimes does.<\/p>\n<p>To save a file, press <strong>Ctrl + S<\/strong> (Windows) or <strong>Command + S<\/strong> (Mac). Do this every few minutes when working on something important. It takes less than a second and prevents the heartbreak of losing two hours of careful typing because the power went out.<\/p>\n<p>When you save a file for the first time, a box will appear asking you to give it a name and choose where to save it. Pick something descriptive (&#8220;Letter to Dentist March 2026&#8221; is better than &#8220;Document1&#8221;) and save it somewhere sensible like your Documents folder.<\/p>\n<p><strong>Save As<\/strong> (Ctrl + Shift + S, or File menu \u2192 Save As) lets you save a copy of a file with a new name or in a different location. Useful when you want to keep the original and make changes to a new version.<\/p>\n<h3>Copying, Moving, and Deleting Files<\/h3>\n<p>Right-clicking on any file gives you a menu of options. From here you can:<\/p>\n<p><strong>Copy<\/strong> \u2014 Creates a duplicate. The original stays where it is.<\/p>\n<p><strong>Cut<\/strong> \u2014 Prepares the file to be moved. The original will disappear once you paste it somewhere else.<\/p>\n<p><strong>Paste<\/strong> \u2014 Places a copied or cut file in a new location. Navigate to where you want it, right-click on empty space, and select Paste. Or use Ctrl+V.<\/p>\n<p><strong>Delete<\/strong> \u2014 Sends the file to the Recycle Bin (Windows) or Trash (Mac). It&#8217;s not permanently deleted yet \u2014 it sits there until you &#8220;empty&#8221; the bin. This is your safety net.<\/p>\n<p><strong>Rename<\/strong> \u2014 Lets you give the file a new name. Click once on a file to select it, then press F2 (Windows) or press Enter (Mac) to rename it.<\/p>\n<p>Kate accidentally deleted a folder once and recovered it by opening the Recycle Bin, right-clicking the folder, and selecting &#8220;Restore.&#8221; She felt like a hacker. She was not a hacker. She was a woman who knew where the Recycle Bin was, which is arguably better.<\/p>\n<h2>Part 4: Getting Online \u2014 The Whole Point, Really<\/h2>\n<h3>Connecting to Wi-Fi<\/h3>\n<p>Wi-Fi is wireless internet. Your home router broadcasts a Wi-Fi signal that your computer can connect to, giving you access to the internet without any cables.<\/p>\n<p>To connect on Windows, click the Wi-Fi icon in the bottom-right corner of your taskbar (it looks like rising signal bars or a globe if not connected). A list of available networks appears. Click your home network&#8217;s name \u2014 this is called the <strong>SSID<\/strong> and is usually printed on a sticker on your router. Enter the password (also on the sticker, usually a long string of random characters). Click Connect. Done.<\/p>\n<p>On Mac, click the Wi-Fi icon in the top-right menu bar. Same process.<\/p>\n<p>Once connected, your computer remembers the network and reconnects automatically in future. If your internet ever seems to stop working, the classic first step is: turn the router off, wait 30 seconds, turn it back on. This solves roughly 60% of all home internet problems. The other 40% involves calling your internet provider and listening to hold music.<\/p>\n<h3>Using a Web Browser<\/h3>\n<p>A web browser is the program you use to visit websites. Common ones include:<\/p>\n<p><strong>Google Chrome<\/strong> \u2014 The most popular browser. Fast, works everywhere, made by Google.<\/p>\n<p><strong>Microsoft Edge<\/strong> \u2014 Built into Windows. Perfectly good, unfairly ignored.<\/p>\n<p><strong>Mozilla Firefox<\/strong> \u2014 Excellent, privacy-focused, beloved by people who use the word &#8220;privacy-focused.&#8221;<\/p>\n<p><strong>Safari<\/strong> \u2014 Built into Macs and iPhones. Sleek, efficient, slightly exclusive.<\/p>\n<p>They all do the same fundamental thing: they take you to websites. Kate uses Chrome, which is fine. All of these are fine.<\/p>\n<h3>Navigating the Browser<\/h3>\n<p>At the top of your browser is the <strong>address bar<\/strong> \u2014 a long box where you type website addresses (called URLs). Every website address starts with <em>https:\/\/<\/em> (though you don&#8217;t need to type that part), followed by the site name. For example: <em>www.bbc.co.uk<\/em> or <em>www.google.com<\/em>.<\/p>\n<p>Press Enter after typing an address and the browser will take you there.<\/p>\n<p>You can also just type what you&#8217;re looking for directly into the address bar \u2014 &#8220;best pasta recipe&#8221; or &#8220;local GP near me&#8221; \u2014 and the browser will use a search engine to find relevant results. This is probably how most people use browsers ninety percent of the time.<\/p>\n<p>Key browser buttons to know:<\/p>\n<p><strong>Back arrow (\u2190)<\/strong> \u2014 Goes to the previous page.<\/p>\n<p><strong>Forward arrow (\u2192)<\/strong> \u2014 Goes forward again after going back.<\/p>\n<p><strong>Refresh button (\u21ba)<\/strong> \u2014 Reloads the current page. Useful if a page hasn&#8217;t loaded properly.<\/p>\n<p><strong>Home button<\/strong> \u2014 Returns to your browser&#8217;s start page.<\/p>\n<p><strong>The X next to the loading spinner<\/strong> \u2014 Stops a page from loading. Useful if something is taking too long.<\/p>\n<h3>Tabs \u2014 The Browser&#8217;s Best Feature<\/h3>\n<p>Tabs let you have multiple websites open at the same time within one browser window. Each tab appears as a labelled strip along the top of the browser.<\/p>\n<p>To open a new tab: press <strong>Ctrl + T<\/strong> (Windows) or <strong>Command + T<\/strong> (Mac), or click the little + button next to your existing tabs.<\/p>\n<p>To close a tab: click the X on it, or press <strong>Ctrl + W<\/strong> \/ <strong>Command + W<\/strong>.<\/p>\n<p>Accidentally closed a tab? Press <strong>Ctrl + Shift + T<\/strong> (Windows) or <strong>Command + Shift + T<\/strong> (Mac) to bring it back. This is one of the most-used keyboard shortcuts in existence.<\/p>\n<p>Kate currently has 47 tabs open. This is not recommended. Three to five is civilised. Anything above ten and your computer starts to wheeze.<\/p>\n<h3>Search Engines \u2014 How to Find Anything<\/h3>\n<p>A search engine is a tool that indexes the internet and finds relevant results based on what you type. <strong>Google<\/strong> is the most popular by an enormous margin, but <strong>Bing<\/strong>, <strong>DuckDuckGo<\/strong>, and others exist.<\/p>\n<p>Good search habits make a huge difference:<\/p>\n<p>Be specific. &#8220;Chicken pie recipe easy shortcrust pastry&#8221; will serve you better than &#8220;pie.&#8221;<\/p>\n<p>Use quotation marks to search for an exact phrase: <em>&#8220;chicken and leek pie&#8221;<\/em> will only show results containing those words in that order.<\/p>\n<p>Add a location for local results: &#8220;dentists accepting new patients Manchester.&#8221;<\/p>\n<p>Add &#8220;how to&#8221; for instructions: &#8220;how to change a duvet cover without losing your mind.&#8221;<\/p>\n<p>Add the current year for recent information: &#8220;best antivirus software 2026.&#8221;<\/p>\n<p>Not everything in search results is true or trustworthy. We&#8217;ll address that thoroughly in the internet safety section, because it matters enormously.<\/p>\n<h2>Part 5: Email \u2014 Still the Backbone of the Internet<\/h2>\n<h3>Setting Up an Email Account<\/h3>\n<p>Email (electronic mail) is how most official communication happens online \u2014 from banks, doctors, online shops, government services, and the occasional newsletter you signed up for in 2019 and have been meaning to unsubscribe from ever since.<\/p>\n<p>The most popular free email providers are:<\/p>\n<p><strong>Gmail<\/strong> (Google) \u2014 go to <em>gmail.com<\/em> and click &#8220;Create account.&#8221;<\/p>\n<p><strong>Outlook \/ Hotmail<\/strong> (Microsoft) \u2014 go to <em>outlook.com<\/em>.<\/p>\n<p><strong>Yahoo Mail<\/strong> \u2014 go to <em>mail.yahoo.com<\/em>.<\/p>\n<p>When choosing an email address, use something professional and identifiable \u2014 <em>kate.smith@gmail.com<\/em> is better than <em>katiepurpleunicorn99@gmail.com<\/em> for anything official, though the latter has undeniable character.<\/p>\n<h3>Reading, Writing, and Replying to Emails<\/h3>\n<p>Your email inbox shows a list of received messages. Click one to read it. Unread messages are usually shown in bold.<\/p>\n<p>To write a new email, click the &#8220;Compose&#8221; or &#8220;New Email&#8221; button (usually prominent and hard to miss). A window will appear with:<\/p>\n<p><strong>To:<\/strong> \u2014 Type the recipient&#8217;s email address here. Every email address has an @ symbol in it (e.g. <em>friend@gmail.com<\/em>).<\/p>\n<p><strong>Subject:<\/strong> \u2014 A brief summary of what the email is about. &#8220;Quick question about Thursday&#8221; is more useful than leaving it blank.<\/p>\n<p><strong>Body:<\/strong> \u2014 The main message. Type here.<\/p>\n<p>When you&#8217;re done, click Send. The email will arrive in the recipient&#8217;s inbox almost instantly, regardless of whether they&#8217;re next door or on another continent. This still feels faintly miraculous if you think about it.<\/p>\n<p><strong>Reply<\/strong> responds to the sender of an email you&#8217;ve received.<\/p>\n<p><strong>Reply All<\/strong> responds to everyone on the email, including anyone CC&#8217;d. Use this cautiously. Many workplace embarrassments have originated from an ill-judged Reply All.<\/p>\n<p><strong>Forward<\/strong> sends the email (and its history) to someone new.<\/p>\n<h3>Attachments<\/h3>\n<p>Attachments are files sent alongside an email \u2014 a document, photo, or PDF. To attach a file, click the paperclip icon when composing an email, then browse to find the file on your computer and select it.<\/p>\n<p>To open an attachment you&#8217;ve received, click on it in the email. Be cautious with attachments from people you don&#8217;t know \u2014 this is something we&#8217;ll return to in the safety section, and it&#8217;s important.<\/p>\n<h3>Organising Your Inbox<\/h3>\n<p>Emails pile up fast. Left unmanaged, your inbox becomes a digital junk drawer. A few habits keep it manageable:<\/p>\n<p>Create <strong>folders<\/strong> (or &#8220;labels&#8221; in Gmail) to file emails by category \u2014 Work, Family, Bills, Shopping, etc. Most email services let you right-click an email to move it to a folder.<\/p>\n<p><strong>Unsubscribe<\/strong> from newsletters and marketing emails you never read. There&#8217;s usually an &#8220;Unsubscribe&#8221; link at the very bottom of these emails, often in tiny text. Clicking it should remove you from their mailing list within a day or two.<\/p>\n<p>Use the <strong>spam\/junk<\/strong> folder wisely. Your email service automatically filters obvious junk here. Check it occasionally as legitimate emails sometimes land there by mistake, then mark them as &#8220;Not Spam&#8221; to train the filter.<\/p>\n<p>Delete what you don&#8217;t need. Storing ten years of old emails uses storage space and makes finding things harder.<\/p>\n<h2>Part 6: Passwords \u2014 Your First Line of Defence<\/h2>\n<p>Here&#8217;s where things get serious \u2014 but don&#8217;t worry, Kate, we&#8217;ll keep it friendly.<\/p>\n<h3>Why Passwords Matter<\/h3>\n<p>Passwords protect your accounts. Your email, your bank, your shopping accounts, your social media \u2014 all of them sit behind a password. If someone else gets your password, they can access your account, impersonate you, spend your money, or steal your personal information.<\/p>\n<p>Cybercriminals try to crack passwords every day. They use sophisticated programs that test millions of combinations per second. They also buy leaked password lists from previous data breaches and try those against other services. This is why your passwords matter more than you might think.<\/p>\n<h3>What Makes a Strong Password?<\/h3>\n<p>A strong password is:<\/p>\n<p><strong>Long<\/strong> \u2014 At least 12 characters, ideally more. Length matters more than complexity.<\/p>\n<p><strong>Unique<\/strong> \u2014 Different for every account. This is non-negotiable.<\/p>\n<p><strong>Unpredictable<\/strong> \u2014 Not your name, birthday, pet&#8217;s name, or any word in the dictionary.<\/p>\n<p>The best approach is a <strong>passphrase<\/strong> \u2014 a string of random words strung together. Something like <em>PurpleTrampolineFishWhistle<\/em> is genuinely more secure than <em>P@ssw0rd!<\/em>, despite looking far less impressive. Length beats complexity every time.<\/p>\n<p>Common passwords to absolutely never use:<\/p>\n<p>123456 | password | qwerty | letmein | abc123 | your name | your birthday | your pet&#8217;s name | your child&#8217;s name<\/p>\n<p>These are the first things attackers try. They&#8217;re in every &#8220;most used passwords&#8221; list published annually, which is both understandable and a bit heartbreaking.<\/p>\n<h3>Using a Password Manager<\/h3>\n<p>Here&#8217;s Kate&#8217;s problem: she has twenty accounts and is supposed to have a different strong password for every one. Nobody can memorise twenty random passphrases.<\/p>\n<p>The solution is a <strong>password manager<\/strong> \u2014 a program that stores all your passwords securely, locked behind one master password that only you know. You only need to remember one password. The manager remembers the rest and can generate strong new ones for you automatically.<\/p>\n<p>Recommended password managers:<\/p>\n<p><strong>Bitwarden<\/strong> \u2014 Free, open-source, excellent. This is the one Kate should use.<\/p>\n<p><strong>1Password<\/strong> \u2014 Paid but polished and well-regarded.<\/p>\n<p><strong>Dashlane<\/strong> \u2014 Good free tier with useful features.<\/p>\n<p><strong>The one built into your browser<\/strong> \u2014 Chrome, Firefox, and Edge all have built-in password managers that are decent and very convenient.<\/p>\n<p>Write your master password down and store it somewhere physically secure \u2014 a locked drawer, a safe, somewhere you won&#8217;t lose it. If you forget the master password you lose access to everything. This is the one you cannot afford to forget.<\/p>\n<h3>Two-Factor Authentication (2FA) \u2014 The Second Lock on the Door<\/h3>\n<p>Two-factor authentication (2FA) means that even if someone has your password, they still can&#8217;t get into your account without a second proof of identity \u2014 usually a code sent to your phone, or generated by an app.<\/p>\n<p>Think of it like a bank card: the card is your password, the PIN is your second factor. Both are needed.<\/p>\n<p>Enable 2FA on every account that offers it, especially:<\/p>\n<p>Your email account (this is the most important one)<\/p>\n<p>Your bank and financial accounts<\/p>\n<p>Any account linked to payment details<\/p>\n<p>Social media accounts<\/p>\n<p>To enable it, look in your account&#8217;s Settings or Security section for &#8220;Two-factor authentication,&#8221; &#8220;Two-step verification,&#8221; or &#8220;Login verification.&#8221; It will walk you through the setup. It takes about five minutes and dramatically improves your security.<\/p>\n<h2>Part 7: Staying Safe Online \u2014 The Bit That Really Matters<\/h2>\n<p>This is the heart of the whole guide. Everything else makes you competent. This part keeps you safe.<\/p>\n<h3>Phishing \u2014 Don&#8217;t Take the Bait<\/h3>\n<p><strong>Phishing<\/strong> (pronounced &#8220;fishing&#8221; \u2014 yes, really) is when criminals send fake emails, texts, or messages pretending to be someone trustworthy in order to trick you into giving them your personal information, clicking a malicious link, or transferring money.<\/p>\n<p>These messages pretend to be from your bank, from Royal Mail about a missed delivery, from HMRC about a tax refund, from Amazon about a suspicious order, or from a friend whose account has been hacked. They look incredibly convincing. They&#8217;re designed to.<\/p>\n<p>Warning signs of a phishing attempt:<\/p>\n<p><strong>Urgency<\/strong> \u2014 &#8220;Your account will be closed in 24 hours!&#8221; Legitimate organisations rarely create panic deadlines.<\/p>\n<p><strong>Unexpected contact<\/strong> \u2014 You weren&#8217;t expecting a message from your bank. Be suspicious.<\/p>\n<p><strong>Suspicious email addresses<\/strong> \u2014 The email might say it&#8217;s from Barclays but the actual address is <em>barclays-secure@gmail.com<\/em> or similar. Check the sender&#8217;s actual address, not just the display name.<\/p>\n<p><strong>Poor spelling and grammar<\/strong> \u2014 Not always present in modern phishing (attackers have improved), but still a red flag.<\/p>\n<p><strong>Generic greetings<\/strong> \u2014 &#8220;Dear Customer&#8221; instead of your actual name.<\/p>\n<p><strong>Suspicious links<\/strong> \u2014 Hover your mouse over any link before clicking it. The actual web address it points to will appear at the bottom of your screen. If it looks strange or doesn&#8217;t match who supposedly sent it, don&#8217;t click.<\/p>\n<p>Kate&#8217;s golden rule: <strong>When in doubt, don&#8217;t click.<\/strong> If you think an email might be genuine, go directly to the company&#8217;s website by typing the address yourself \u2014 never follow a link in an email you&#8217;re unsure about. Then log in and check if there&#8217;s actually a problem.<\/p>\n<p>If you receive a suspicious email, you can report it in the UK by forwarding it to <em>report@phishing.gov.uk<\/em>. In the US, forward it to <em>reportphishing@apwg.org<\/em>. Then delete it.<\/p>\n<h3>Scam Websites<\/h3>\n<p>Not every website is what it claims to be. Fake websites are designed to look identical to legitimate ones \u2014 your bank, online shops, government portals \u2014 to steal your login details or payment information.<\/p>\n<p>How to spot a legitimate website:<\/p>\n<p><strong>HTTPS and the padlock:<\/strong> Look at your browser&#8217;s address bar. A secure website starts with <em>https:\/\/<\/em> (not just <em>http:\/\/<\/em>) and shows a padlock icon. Click the padlock for more information about the site&#8217;s security certificate. This doesn&#8217;t guarantee a site is legitimate \u2014 scammers can get HTTPS certificates too \u2014 but a site without it should definitely be avoided for anything involving personal data or payments.<\/p>\n<p><strong>Check the address carefully:<\/strong> Scam sites use addresses like <em>www.amazon-secure-login.com<\/em> or <em>www.amaz0n.com<\/em> (with a zero instead of an O). The real Amazon is at <em>www.amazon.co.uk<\/em> or <em>www.amazon.com<\/em>. Look for these subtle substitutions.<\/p>\n<p><strong>Contact information:<\/strong> Legitimate businesses have clear contact details, registered addresses, and typically a phone number. If a shop&#8217;s website has no contact page or only a generic email form, that&#8217;s a flag.<\/p>\n<p><strong>Trust your instincts:<\/strong> If a deal looks unbelievably good or a website feels slightly off, listen to that feeling. The internet version of &#8220;if it seems too good to be true, it probably is&#8221; applies here with full force.<\/p>\n<h3>Safe Online Shopping<\/h3>\n<p>Online shopping is one of the great conveniences of modern life and completely safe when done carefully. Kate shops online regularly. Here&#8217;s how she does it safely:<\/p>\n<p>Stick to well-known retailers where possible (Amazon, John Lewis, Next, M&amp;S, Boots, etc.). For smaller or unfamiliar shops, look for reviews on independent review sites like Trustpilot. Search for the shop&#8217;s name plus &#8220;reviews&#8221; or &#8220;scam&#8221; to see what others have experienced.<\/p>\n<p>Pay by <strong>credit card<\/strong> where possible, or use <strong>PayPal<\/strong>. Credit card payments offer strong consumer protection \u2014 if goods don&#8217;t arrive or aren&#8217;t as described, your card company can reverse the charge (called a &#8220;chargeback&#8221;). Debit cards offer less protection. Bank transfers offer almost none at all. Never pay a stranger by bank transfer for goods.<\/p>\n<p>Never save your card details on websites you don&#8217;t fully trust. Even on reputable sites, consider whether the convenience of saved details is worth the risk if the company ever suffers a data breach.<\/p>\n<p>Check the returns policy before buying. Reputable retailers make it easy to return items. Vague or non-existent returns policies are a warning sign.<\/p>\n<h3>Social Media Safety<\/h3>\n<p>Social media platforms (Facebook, Instagram, X\/Twitter, TikTok, LinkedIn, and many others) let you connect and share with others. They&#8217;re wonderful \u2014 and they require care.<\/p>\n<p><strong>Privacy settings matter.<\/strong> Most social media platforms default to sharing your posts publicly \u2014 meaning anyone, anywhere in the world, can see them. Review your privacy settings and consider restricting your posts to friends only, especially if you share personal information, photos of your home or children, or holiday plans (which effectively broadcast &#8220;our house is empty&#8221;).<\/p>\n<p><strong>Think before you post.<\/strong> Once something is on the internet it can be very hard to remove, even after deletion. Screenshots exist. Posts go viral. Future employers, landlords, and family members may one day see what you share today. Not to induce paranoia \u2014 share freely and joyfully \u2014 just be conscious of it.<\/p>\n<p><strong>Be cautious of strangers.<\/strong> Friend requests and follow requests from people you don&#8217;t recognise can be genuine, or can be fake accounts built to gather information about you. Don&#8217;t accept requests from people you don&#8217;t know, and be especially cautious about anyone who quickly becomes overly familiar or starts asking personal questions or requesting money.<\/p>\n<p><strong>Romance scams<\/strong> deserve specific mention because they cause enormous financial and emotional damage. Criminals create fake profiles, build trust over weeks or months, then invent crises requiring money. If someone you&#8217;ve met only online \u2014 however long you&#8217;ve been talking \u2014 asks you for money, that is a scam. Always. Without exception.<\/p>\n<h3>Software Updates \u2014 Not an Inconvenience, a Necessity<\/h3>\n<p>That little pop-up telling you an update is available for Windows, your browser, or your apps? Don&#8217;t dismiss it. Updates frequently contain <strong>security patches<\/strong> \u2014 fixes for vulnerabilities that attackers are actively trying to exploit. An unpatched computer is a computer with known unlocked doors.<\/p>\n<p>Enable automatic updates wherever possible. Let Windows update overnight. Keep your browser and apps up to date. It takes minimal effort and makes an enormous difference to your security.<\/p>\n<h3>Antivirus Software \u2014 Your Digital Immune System<\/h3>\n<p><strong>Antivirus software<\/strong> monitors your computer for malicious programs (malware, viruses, ransomware) and either prevents them from installing or removes them once found.<\/p>\n<p>The good news: Windows computers come with <strong>Windows Defender<\/strong> built in and it&#8217;s genuinely good. For most home users it&#8217;s entirely sufficient, provided it stays updated (it does so automatically).<\/p>\n<p>If you want additional protection, reputable paid options include <strong>Bitdefender<\/strong>, <strong>Norton<\/strong>, and <strong>Kaspersky<\/strong> (though note Kaspersky has faced scrutiny in some countries over its Russian origins \u2014 check current guidance). Free options include <strong>Avast<\/strong> and <strong>AVG<\/strong>, though their free tiers come with persistent upselling.<\/p>\n<p>What antivirus software <em>cannot<\/em> protect you from: your own decisions. If you click a phishing link, hand over your password, or deliberately download suspicious software, no antivirus can reliably save you. The most important security layer is always the person sitting in front of the keyboard.<\/p>\n<h3>Public Wi-Fi \u2014 Useful but Risky<\/h3>\n<p>Free Wi-Fi in coffee shops, hotels, airports, and libraries is genuinely useful. It&#8217;s also worth being careful with.<\/p>\n<p>On public Wi-Fi, other people on the same network can potentially intercept data you send and receive if it&#8217;s not encrypted. Most modern websites use HTTPS (look for that padlock), which encrypts your data and makes interception very difficult. But it&#8217;s still wise to:<\/p>\n<p>Avoid accessing your bank or making financial transactions on public Wi-Fi.<\/p>\n<p>Not enter passwords on public Wi-Fi if you can help it \u2014 wait until you&#8217;re on your secure home network.<\/p>\n<p>Consider a <strong>VPN<\/strong> (Virtual Private Network) if you use public Wi-Fi regularly. A VPN encrypts all your internet traffic, making it essentially unreadable to anyone trying to intercept it. Reputable paid VPNs include <strong>Mullvad<\/strong>, <strong>ProtonVPN<\/strong>, and <strong>ExpressVPN<\/strong>.<\/p>\n<h3>Backing Up Your Files \u2014 Plan for the Worst<\/h3>\n<p>Computers fail. Hard drives die without warning. Ransomware encrypts your files and demands payment for their return. Laptops get stolen. Accidents happen. Kate once spilled an entire cup of tea on her laptop (she is fine; the laptop is not).<\/p>\n<p>A backup means that when (not if) something goes wrong, you don&#8217;t lose everything.<\/p>\n<p>The gold standard is the <strong>3-2-1 rule<\/strong>:<\/p>\n<p><strong>3<\/strong> copies of your data.<\/p>\n<p><strong>2<\/strong> different types of storage (e.g. computer + external drive).<\/p>\n<p><strong>1<\/strong> copy offsite (e.g. in the cloud).<\/p>\n<p>In practice, for a home user, this means:<\/p>\n<p>An <strong>external hard drive<\/strong> \u2014 a portable storage device you plug in via USB and copy your important files to regularly. Drives with 1TB of storage cost very little and hold an enormous amount. Set up Windows Backup or Mac Time Machine to do this automatically.<\/p>\n<p>A <strong>cloud backup service<\/strong> \u2014 services like <strong>OneDrive<\/strong> (built into Windows), <strong>iCloud<\/strong> (built into Macs), or <strong>Google Drive<\/strong> automatically sync your files to remote servers. If your house burns down (extreme, but possible), your files survive.<\/p>\n<p>Back up regularly. Check occasionally that your backups have actually worked by trying to open a backed-up file. A backup you&#8217;ve never tested is a backup you can&#8217;t fully trust.<\/p>\n<h2>Part 8: Essential Keyboard Shortcuts Kate Should Know<\/h2>\n<p>You&#8217;ve made it this far. You deserve a useful cheat sheet.<\/p>\n<p><strong>Ctrl + C<\/strong> (Windows) \/ <strong>Command + C<\/strong> (Mac) \u2014 Copy selected text or file.<\/p>\n<p><strong>Ctrl + X<\/strong> \/ <strong>Command + X<\/strong> \u2014 Cut (copy and remove original).<\/p>\n<p><strong>Ctrl + V<\/strong> \/ <strong>Command + V<\/strong> \u2014 Paste.<\/p>\n<p><strong>Ctrl + Z<\/strong> \/ <strong>Command + Z<\/strong> \u2014 Undo the last action. This is wonderful. Use it freely.<\/p>\n<p><strong>Ctrl + S<\/strong> \/ <strong>Command + S<\/strong> \u2014 Save. Do this constantly.<\/p>\n<p><strong>Ctrl + A<\/strong> \/ <strong>Command + A<\/strong> \u2014 Select all text or files in a window.<\/p>\n<p><strong>Ctrl + F<\/strong> \/ <strong>Command + F<\/strong> \u2014 Find. Opens a search box to find text on a page or in a document.<\/p>\n<p><strong>Ctrl + P<\/strong> \/ <strong>Command + P<\/strong> \u2014 Print.<\/p>\n<p><strong>Ctrl + T<\/strong> \/ <strong>Command + T<\/strong> \u2014 New browser tab.<\/p>\n<p><strong>Ctrl + W<\/strong> \/ <strong>Command + W<\/strong> \u2014 Close current tab or window.<\/p>\n<p><strong>Ctrl + Shift + T<\/strong> \/ <strong>Command + Shift + T<\/strong> \u2014 Reopen last closed tab.<\/p>\n<p><strong>Alt + Tab<\/strong> \/ <strong>Command + Tab<\/strong> \u2014 Switch between open programs.<\/p>\n<p><strong>Windows key + L<\/strong> \/ <strong>Command + Control + Q<\/strong> \u2014 Lock your computer. Do this whenever you walk away from it in a public place.<\/p>\n<p><strong>F11<\/strong> (Windows) \/ <strong>Command + Shift + F<\/strong> (Chrome) \u2014 Full screen browser mode. F11 again to exit.<\/p>\n<p><strong>Ctrl + + (plus)<\/strong> \/ <strong>Command + +<\/strong> \u2014 Zoom in. Useful for small text.<\/p>\n<p><strong>Ctrl + &#8211; (minus)<\/strong> \/ <strong>Command + &#8211;<\/strong> \u2014 Zoom out.<\/p>\n<p><strong>Ctrl + 0<\/strong> \/ <strong>Command + 0<\/strong> \u2014 Reset zoom to normal.<\/p>\n<h2>Part 9: When Things Go Wrong (And They Will)<\/h2>\n<p>Every computer user encounters problems. Every single one. The difference between a confident user and a panicked one is knowing that most problems are solvable \u2014 and knowing the first steps to take.<\/p>\n<h3>The Computer is Frozen<\/h3>\n<p>Sometimes a program stops responding and the cursor won&#8217;t move. Wait 30 seconds first \u2014 the computer may just be thinking very hard. If nothing changes:<\/p>\n<p>On Windows: Press <strong>Ctrl + Alt + Delete<\/strong>. Select &#8220;Task Manager.&#8221; Find the unresponsive program in the list, click it, and click &#8220;End Task.&#8221;<\/p>\n<p>On Mac: Press <strong>Command + Option + Escape<\/strong>. Select the unresponsive app and click &#8220;Force Quit.&#8221;<\/p>\n<p>If nothing works: Hold down the power button for 5-10 seconds to force a shutdown. Then restart. Unsaved work may be lost, which is why Ctrl+S is your best friend.<\/p>\n<h3>The Computer is Slow<\/h3>\n<p>A sluggish computer is usually caused by too many programs running at once, too little free storage space, or an outdated operating system. First steps:<\/p>\n<p>Close programs you&#8217;re not using.<\/p>\n<p>Restart the computer. Many people leave computers on for weeks without restarting. A fresh restart clears temporary files and memory.<\/p>\n<p>Check your storage \u2014 if your hard drive is more than 85% full, performance suffers. Delete old files or move them to an external drive.<\/p>\n<p>Run a malware scan with your antivirus software.<\/p>\n<p>Make sure Windows\/macOS updates are installed.<\/p>\n<h3>The Internet Isn&#8217;t Working<\/h3>\n<p>Step one: Is it just one website, or all websites? Try visiting a few different ones.<\/p>\n<p>Step two: Is it just your computer, or all devices? Try another phone or tablet.<\/p>\n<p>Step three: Restart your router. Unplug it, wait 30 seconds, plug back in. Wait two minutes for it to reconnect fully.<\/p>\n<p>Step four: Restart your computer.<\/p>\n<p>Step five: Call your internet provider.<\/p>\n<p>These five steps resolve the vast majority of home internet problems in the stated order.<\/p>\n<h3>You&#8217;ve Forgotten a Password<\/h3>\n<p>This happens to everyone, including the people who built the systems.<\/p>\n<p>Click &#8220;Forgot password?&#8221; or &#8220;Reset password&#8221; on the login page. You&#8217;ll usually be sent a reset link to your email address. If you&#8217;ve lost access to your email account, look for account recovery options \u2014 usually involving a backup phone number, backup email address, or security questions you set up when creating the account.<\/p>\n<p>This is why having a recovery email or phone number set up on your important accounts is essential. Check yours now if you&#8217;re not sure.<\/p>\n<h3>You Think You&#8217;ve Been Hacked<\/h3>\n<p>Signs your account may have been compromised: you can&#8217;t log in with your usual password, you receive emails about password changes you didn&#8217;t make, your contacts receive messages you didn&#8217;t send, or you notice unfamiliar account activity.<\/p>\n<p>Act immediately:<\/p>\n<p>1. Try to regain access using the account recovery process.<\/p>\n<p>2. Once in, change your password immediately to something strong and unique.<\/p>\n<p>3. Enable two-factor authentication if you haven&#8217;t already.<\/p>\n<p>4. Check connected apps and remove anything unfamiliar.<\/p>\n<p>5. Check whether your email is listed on <em>haveibeenpwned.com<\/em> \u2014 a free, legitimate service that tells you if your details have appeared in any known data breaches.<\/p>\n<p>6. If a financial account is involved, contact your bank immediately.<\/p>\n<h2>Part 10: Where to Learn More<\/h2>\n<p>Kate has come a long way. From not knowing which end to plug in, to understanding phishing emails, two-factor authentication, and why Ctrl+Z might be the best thing ever invented. She should feel genuinely proud.<\/p>\n<p>But learning doesn&#8217;t stop here. Technology changes constantly, and staying curious keeps you safe and capable. Here are excellent free resources to continue learning:<\/p>\n<p><strong>Get Safe Online<\/strong> (<em>getsafeonline.org<\/em>) \u2014 Free, comprehensive, UK-focused internet safety advice for individuals and businesses. Practical, clear, and regularly updated.<\/p>\n<p><strong>Cyber Aware<\/strong> (<em>cyberaware.gov.uk<\/em>) \u2014 The UK Government&#8217;s official cybersecurity advice for the public. Covers passwords, updates, backups, and more in plain English.<\/p>\n<p><strong>Have I Been Pwned<\/strong> (<em>haveibeenpwned.com<\/em>) \u2014 Check whether your email addresses appear in known data breaches. Free, legitimate, and genuinely useful.<\/p>\n<p><strong>GCFGlobal<\/strong> (<em>gcfglobal.org<\/em>) \u2014 Free tutorials on basic computing, internet use, Microsoft Office, Google tools, and more. Excellent for complete beginners.<\/p>\n<p><strong>BBC WebWise<\/strong> \u2014 The BBC&#8217;s digital skills resources, designed specifically for people new to computers and the internet.<\/p>\n<p><strong>Your local library<\/strong> \u2014 Many libraries offer free digital skills classes run by patient, helpful people in person. Check your local council&#8217;s website for details.<\/p>\n<h2>Final Word<\/h2>\n<p>Computers are tools. Like any tool, they serve whoever knows how to use them. There&#8217;s nothing in this guide that requires technical talent or special intelligence \u2014 just patience, practice, and the willingness to occasionally click the wrong thing and learn from it.<\/p>\n<p>Kate started this guide not knowing which end to plug in. She now knows how to save files, send emails, shop safely, create strong passwords, spot a phishing email, and bring back that tab she accidentally closed. She might even have fewer than forty-seven tabs open. Progress.<\/p>\n<p>You&#8217;ve made it too. Welcome to the internet. It&#8217;s chaotic, wonderful, occasionally baffling, and \u2014 handled carefully \u2014 remarkably safe.<\/p>\n<p>Now go and change your passwords. You know you should.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From turning on your computer to spotting a phishing scam, this complete beginner&#8217;s guide covers everything a new computer user needs to know \u2014 written for real people, with patience, clarity, and the occasional laugh along the way.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39,38],"tags":[],"class_list":["post-32","post","type-post","status-publish","format-standard","hentry","category-beginners-guide","category-cybersecurity"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/iamglover.com\/index.php?rest_route=\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/iamglover.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/iamglover.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/iamglover.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/iamglover.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32"}],"version-history":[{"count":0,"href":"http:\/\/iamglover.com\/index.php?rest_route=\/wp\/v2\/posts\/32\/revisions"}],"wp:attachment":[{"href":"http:\/\/iamglover.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/iamglover.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/iamglover.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}