XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Mobile Office Hosted Solutions Data Productivity Hardware Mobile Devices VoIP Gadgets Quick Tips Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity Server Virtualization Business Smartphones Network Security IT Services Miscellaneous Innovation Upgrade Windows Disaster Recovery Communication Managed IT Services Microsoft Office Users Mobile Device Management Computer Communications Passwords Android User Tips Smartphone Marketing Browser Alert WiFi Holiday Data Backup Vendor Management Save Money Ransomware Remote Monitoring Cybercrime Windows 10 Operating System Mobile Computing Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime Chrome Telephone Systems Outsourced IT Data Recovery Big Data Remote Computing Current Events Going Green IT Solutions History Best Practice The Internet of Things Cloud Computing VPN Collaboration BDR Hacking Firewall Phone System Spam Automation Social Engineering Wireless Technology Employer-Employee Relationship Health IT Consultant Router Trending Internet of Things Application Printer Bandwidth Proactive IT Lithium-ion Battery Office Budget Excel Cybersecurity App Facebook iPhone Money Business Managament Business Intelligence Content Filtering Fax Server Maintenance Managed IT Services Windows 8 Two-factor Authentication Tech Term Mobility Artificial Intelligence Recovery How To User Error Customer Relationship Management Humor Hard Drives Outlook Mouse Private Cloud Website Phishing Tutorials Redundancy Networking Virus Law Enforcement Antivirus Gmail Data Protection Analytics Apps PowerPoint Unified Threat Management Data Security Managed IT Value Twitter Save Time Productivity Streaming Media Risk Management Inbound Marketing Office Tips Data Management Windows 10 Compliance Saving Time Office 365 Flexibility Administration Mobile Device Vulnerability Digital Payment Retail Social Networking Downtime Computer Repair Memory Tech Support Conferencing Google Drive Identity Theft Network Congestion Tablet Search Online Currency Computer Accessories IT Management PDF Data loss Smart Tech Point of Sale HaaS End of Support Robot Recycling Document Management Safety Wi-Fi Training Government Spam Blocking CES Meetings IT Plan Social Statistics DDoS Skype Programming Touchscreen Unsupported Software Webinar Solid State Drive Infrastructure Encryption Running Cable Entertainment OneNote Intranet Black Market Wearable Technology Update Data Storage Wireless Physical Security Environment Cleaning Word Settings Comparison Human Resources Public Cloud Video Surveillance Work/Life Balance Data Breach SaaS Best Available Biometrics Bluetooth IT service Hacker Workers IBM Scam People Data storage Piracy Leadership Samsung Administrator eWaste Credit Cards Sports Internet Exlporer 3D Monitor Millennials Access Control Science Scheduling Mobile Cortana Strategy USB Knowledge Servers Wireless Charging FENG eBay Multi-Factor Security Alerts Frequently Asked Questions Fraud Content Filter Entrepreneur Patch Management IT Security YouTube Education Reputation Workforce Authentication Tablets 360 Emails Print Server Professional Services Google Apps Screen Mirroring Lifestyle Insurance Hiring/Firing nternet Crowdfunding Internet exploMicrosoft Flash Fiber-Optic Windows Media Player Virtual Desktop Electronic Medical Records Remote Support Text Messaging Business Owner Work Station Tip of the week Amazon Storage Cost Management Windows 10s Gaming Console NarrowBand Software as a Service Content Management Analysis Cast Company Culture Customers Telecommuting Nanotechnology Upgrades Analyitcs Law Firm IT Uninterrupted Power Supply Tools Charger Practices HIPAA IT Support Advertising Sync Cables Customer Service Hiring/Firing Augmented Reality Applications Accountants Consultant Help Desk Distributed Denial of Service LinkedIn Files Windows Server 2008 Amazon Web Services Addiction Instant Messaging Chromecast Blockchain Computer Care Net Neutrality Software Tips Remote Work Connectivity Hosted Solution Password Password Manager Hosted Computing Keyboard File Sharing Notifications Telephony Unified Communications Cameras Windows 8.1 Update Licensing Colocation Windows 7 Online Shopping Cache Audit Display Laptop Google Docs Staff SharePoint Devices Virtual Reality Netflix Webcam Shadow IT Debate Botnet Business Mangement WIndows 7 Data Warehousing Specifications Inventory Hybrid Cloud Start Menu Theft Printer Server Shortcut Root Cause Analysis IoT User Supercomputer IaaS Computing Infrastructure Regulations Evernote Wireless Internet Worker Commute Computer Fan Macro Touchpad Voice over Internet Protocol Digital Signature PC Care Relocation HBO Thought Leadership Bloatware Co-managed IT Legal Travel Criminal Managing Stress Domains Music Worker Audiobook Wire Assessment Rootkit Politics Battery Television Transportation Video Games Troubleshooting Webinar Automobile Public Computer Benefits Scalability Thank You IT solutions Employer Employee Relationship CrashOverride Smart Technology How to Loyalty Congratulations Books Techology Experience Content Two Factor Authentication Emergency

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *