The default configuration for a 750 is going to be for your standard home use, that’s why they come like that by default.
A DHCP server is for a layer2 network, it does not travel across layer3 hops, which means that no they will not interfere with each other since your 750 will be handling the routing for your guests and clients.
The first step is to remove the port(s) that you want to go to the LAN PC from the switch chip, this is done by setting their master-port to ‘none’. This makes them a stand alone routed interface that you can do anything that you want to with them.
So the first step after that is going to be to assign an IP address to that interface, lets say you want the subnet there to be 192.168.50.0/24, and you want ether3 to go to the LAN PCs.
/ip address add interface=ether3 address=192.168.50.1/24
Then you will want to have a DHCP server and hand out addresses to those PCs unless you want to do static addresses for each one.
/ip pool add name="LAN PC" ranges=192.168.50.10-192.168.50.254
/ip dhcp-server add address-pool="LAN PC" interface=ether3 lease-time=1d name="DHCP PC"
/ip dhcp-server network add address=192.168.50.0/24 gateway=192.168.50.1 dns-server=4.2.2.2,8.8.4.4
Now you are at the point of the PCs being able to pick up a lease and communicate to the router. The next thing that you will likely want to do is make it possible for the PCs to get out to the internet. This is done with NAT.
/ip firewall nat add chain=srcnat action=masquerade out-interface=ether1
This rule could already be in place with the default configuration, and is the most general and basic rule that is available for that. There is a lot you can do here, but that is outside of the scope of this thread for now.
The last thing you will likely want to do is prevent your LAN PCs from accessing computers on the hotspot interface and the computers on the hotspot interface from talking to the LAN PCs. This is done in the firewall filter. There is a very basic set of rules to accomplish this.
/ip firewall filter
add action=accept chain=forward connection-state=established disabled=no
add action=accept chain=forward connection-state=related disabled=no
add action=drop chain=forward connection-state=invalid disabled=no
add action=accept chain=forward out-interface=ether1
add action=drop chain=forward
These rules are basically allowing traffic to be forwarded through the router out of ether1, your WAN port, but any other traffic being forwarded over the router will be dropped. Once again you can get a lot more fancy with these rules and do a lot of things to fit your needs, but that is the most basic stateful firewall and a good place to start.