Using a Hardware Wallet
Most high-quality hardware wallets on the market today usually have a setup phrase. This where you will generate your initial seed phrases (often a Bip39 phrase) and set your passphrase or pin physically on the device. The seed phrases can be used to generate keys for multiple crypto-currencies such as Bitcoin and Ethereum.
The wallets will ask you to write down your seed phrase and will test you to ensure you wrote it down correctly. This is very important. If you do not write it down correctly you can, and most likely will, lose all your funds in the event the device is lost, stolen or damaged. Your seed phrase is your backup, make sure you write it down and secure it properly.
Once the setup phase is over, you can start to use your hardware wallet. This is done by plugging it into a computer or phone and using either the manufacturer's software or a third-party wallet application to make requests to the device.
Hardware wallets are designed to take requests from computers and phones. However, only the person using the wallet who has the passphrase or pin will be able to follow through with requests from the computer, often to sign-off the requested transactions. There is usually a verification step where you can physically verify on the device what you are signing or confirming.
You should be extremely careful when verifying what you are signing physically on the device. There are cases where if a computer or phone is compromised, it could simply intervene between the trusted third-party app and the hardware wallet and request you to sign-off on a transaction that is invalid or malicious.
Users should be extremely careful and always check, in the verification step, that what is displayed on your computer or phone screen is also being displayed on the device.