XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Gadgets Email Quick Tips Network Security Network Efficiency Innovation IT Support Social Media Business Management Business IT Services Business Continuity Miscellaneous Server Smartphones Upgrade Virtualization Communication User Tips Disaster Recovery Windows Communications Data Backup Computer Managed IT Services Microsoft Office Users Smartphone Data Recovery Mobile Device Management Passwords Browser Android Holiday Marketing Save Money WiFi Ransomware Outsourced IT Alert Tech Term BDR Cybercrime Vendor Management Mobile Computing Internet of Things Chrome Router Windows 10 Operating System Remote Monitoring Cloud Computing Bring Your Own Device Automation Apple Artificial Intelligence BYOD Information Technology Avoiding Downtime Computers IT Solutions Telephone Systems Firewall The Internet of Things Going Green Managed IT Services Current Events Spam Best Practice VPN Cybersecurity History Big Data Remote Computing Collaboration Hacking Wireless Technology Trending Printer Facebook Social Engineering IT Consultant Employer-Employee Relationship Health Application Phone System Productivity App Lithium-ion Battery Bandwidth Windows 10 Office Money Mobility Proactive IT Budget Excel Mouse Content Filtering Phishing Networking Mobile Device IT Support Business Managament Office 365 Applications Fax Server Unified Threat Management Two-factor Authentication Maintenance Windows 8 Business Intelligence Recovery How To iPhone Analytics User Error Website Private Cloud Access Control Redundancy Humor Outlook Law Enforcement Gmail Tutorials Data Protection Apps Sports Value Virus Blockchain Encryption Information Word Settings PowerPoint Data Security Google Drive Antivirus Customer Relationship Management Managed IT Hard Drives Training Servers Inbound Marketing Social Downtime Wi-Fi Save Time File Sharing Memory Office Tips Administration Conferencing Software as a Service Data Management Compliance Flexibility Machine Learning Digital Payment Social Networking Entertainment Search Vulnerability Tablet Computer Repair Twitter Analysis Document Management Retail Streaming Media Human Resources Risk Management Managed Service Identity Theft Administrator Connectivity Tech Support Network Congestion Hacker Voice over Internet Protocol Saving Time IT Management Scam Wearable Technology PDF Robot Fraud Safety Spam Blocking USB CES HaaS End of Support Telephone System YouTube Government IT Plan Display Meetings Touchscreen Best Available Bluetooth Content Management Smart Tech Infrastructure DDoS People Unsupported Software OneNote Samsung Solid State Drive Black Market Video Surveillance Update Webinar Online Currency Data Storage Instant Messaging Password Keyboard Recycling Telephony Wireless Physical Security Point of Sale Environment Comparison Cleaning Data Breach Education Windows 7 Paperless Office Piracy Help Desk Google Docs IBM Public Cloud Work/Life Balance Botnet SaaS Leadership Biometrics Statistics Workers IT service Programming Data storage Computer Accessories Skype Credit Cards Virtual Assistant Internet Exlporer Augmented Reality Intranet eWaste Data loss Running Cable Knowledge Macro Wireless Charging Monitor Healthcare Shortcuts FENG Science LinkedIn Multi-Factor Security Strategy Inventory Remote Monitoring and Maintenance Frequently Asked Questions Co-managed IT Wireless Internet Text Messaging Warranty Patch Management Net Neutrality IoT Gaming Console Thought Leadership E-Commerce 360 Emails Windows 8.1 Update Professional Services Google Apps NIST Work Station Screen Mirroring Entrepreneur Workforce Flash Fiber-Optic Reputation Electronic Health Records eCommerce Electronic Medical Records Tablets Lifestyle Line of Business Windows Media Player Virtual Desktop Debate Tip of the week Amazon Wire Microchip Windows 10s Hiring/Firing Internet exploMicrosoft Business Owner Telecommuting NarrowBand Content Filter Camera Tools Cryptocurrency Charger Cast Cost Management HIPAA Sync Cables Customers Vendor Hiring/Firing Upgrades Analyitcs Uninterrupted Power Supply Authentication MSP Customer Service Windows Server 2008 Amazon Web Services Smart Office Insurance Advertising Software Tips Remote Work Chromecast Storage Hosted Solution Consultant Password Manager Distributed Denial of Service Files Safe Mode Computer Care Remote Worker Unified Communications HVAC Security Cameras Webcam Nanotechnology Cameras IT Security Online Shopping Search Engine Audit Staff Notifications Practices Laptop Addiction Virtual Private Network Netflix Licensing Business Mangement Accountants Colocation Business Technology Print Server Shadow IT Wiring Remote Support WIndows 7 Start Menu Theft SharePoint PC Care Enterprise Content Management Root Cause Analysis nternet Virtual Reality Crowdfunding Data Warehousing Specifications Supercomputer Printer Server Shortcut Regulations Evernote 3D Students Bing Computer Fan Digital Signature Scheduling Hosted Computing Hybrid Cloud Proactive HBO Touchpad Cache eBay Project Management User Company Culture Travel Criminal IaaS Computing Infrastructure Worker Commute Law Firm IT Devices Legal GDPR Managing Stress Domains Mobile Cortana Relocation Password Management Alerts Bloatware Millennials Audiobook Smartwatch Assessment Rootkit Politics Battery Transportation Regulation Television Video Games Troubleshooting Webinar Utility Computing Benefits Automobile Public Computer Scalability Printers IT solutions Employer Employee Relationship CrashOverride Smart Technology How to Books Thank You Loyalty Techology Experience Employee/Employer Relationship Content Two Factor Authentication Emergency Congratulations Music Worker

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *