XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Data Productivity Google Hosted Solutions Mobile Office Hardware Mobile Devices VoIP Gadgets Email Quick Tips Malware IT Support Network Efficiency Social Media Business Management Innovation Miscellaneous Business Continuity Smartphones Network Security IT Services Virtualization Upgrade Business Server Windows Disaster Recovery Communication Microsoft Office Managed IT Services Computer Users Communications Passwords Mobile Device Management User Tips Data Backup Android Smartphone Browser Marketing Holiday Save Money Alert WiFi Vendor Management Data Recovery Mobile Computing Ransomware Cybercrime Tech Term Windows 10 Operating System Outsourced IT Remote Monitoring Cloud Computing Computers Bring Your Own Device Apple BYOD Internet of Things Information Technology BDR Avoiding Downtime Chrome Current Events Router Automation Best Practice History Going Green Big Data Remote Computing IT Solutions VPN Telephone Systems The Internet of Things Phone System Application Artificial Intelligence Wireless Technology Collaboration Hacking Health IT Consultant Social Engineering Spam Employer-Employee Relationship Facebook Trending Firewall Cybersecurity Lithium-ion Battery Bandwidth Money Proactive IT Excel Office App Managed IT Services Budget Printer Recovery How To Business Managament Content Filtering Fax Server Maintenance Networking Windows 8 Business Intelligence Two-factor Authentication Mobility iPhone Outlook Hard Drives Redundancy Law Enforcement Mouse Data Protection Tutorials Virus Office 365 Value Applications Website Data Security Phishing Apps Gmail Antivirus Managed IT PowerPoint Unified Threat Management Analytics User Error Humor Private Cloud Customer Relationship Management Data Management Conferencing Inbound Marketing Blockchain Connectivity Sports Search Word Productivity Save Time Tablet Twitter Office Tips Document Management Administration Identity Theft Windows 10 Streaming Media Risk Management Mobile Device Social Networking Digital Payment Compliance Google Drive Computer Repair Flexibility Tech Support IT Support Entertainment Vulnerability Saving Time IT Management Retail Downtime File Sharing Memory Network Congestion Analysis Bluetooth Infrastructure Training Unsupported Software DDoS People Social Paperless Office Samsung Solid State Drive Update Data loss Robot Encryption USB Webinar Black Market Spam Blocking Online Currency Touchscreen Comparison Wireless Physical Security Point of Sale Windows 7 Cleaning Recycling Password Public Cloud Education SaaS Statistics Video Surveillance Credit Cards Programming OneNote Data storage Skype Access Control Scam Instant Messaging eWaste Running Cable IBM Servers Settings Internet Exlporer Augmented Reality Intranet Piracy Data Storage Environment Smart Tech Leadership PDF Wearable Technology Administrator CES Human Resources Biometrics HaaS End of Support Machine Learning Safety Wi-Fi IT Plan Work/Life Balance Data Breach Information Government IT service YouTube Computer Accessories Workers Content Management Hacker Meetings Best Available Supercomputer Worker Commute Nanotechnology Internet exploMicrosoft Debate Tools Computer Fan User HVAC Alerts Telecommuting Practices Managed Service Sync Cables Managing Stress Domains NarrowBand Bloatware Customers Windows Server 2008 Amazon Web Services Addiction Uninterrupted Power Supply Text Messaging Science Accountants Business Technology Software Tips Remote Work Knowledge Advertising Gaming Console Password Manager FENG Enterprise Content Management Work Station Hosted Computing Proactive Distributed Denial of Service Files Telephony Unified Communications Patch Management Students Chromecast Entrepreneur Online Shopping 360 Emails Help Desk Cache Google Docs Staff Screen Mirroring Tablets Virtual Assistant Windows Media Player Virtual Desktop Devices Notifications IT Security Botnet Business Mangement Electronic Medical Records Hiring/Firing Password Management Inventory Remote Monitoring and Maintenance Colocation Print Server Start Menu Theft Windows 10s Healthcare Laptop Data Warehousing Specifications Business Owner Cost Management SharePoint nternet Crowdfunding Regulations Evernote Wireless Internet Shadow IT Remote Support Voice over Internet Protocol Digital Signature Charger Upgrades Cast Analyitcs IoT Telephone System HBO HIPAA Customer Service Thought Leadership Hybrid Cloud Travel Criminal Hiring/Firing NIST Line of Business IaaS Computing Infrastructure Law Firm IT Webcam Mobile Cortana Consultant Electronic Health Records Touchpad Company Culture Millennials Relocation Wireless Charging Hosted Solution Wire Legal Multi-Factor Security Strategy Computer Care Macro Frequently Asked Questions Fraud Keyboard Cameras Content Filter Co-managed IT Cryptocurrency Monitor LinkedIn Authentication MSP Professional Services Google Apps Licensing Audit Net Neutrality PC Care Workforce Insurance Scheduling Flash Fiber-Optic Netflix WIndows 7 Smart Office Windows 8.1 Update 3D Lifestyle Virtual Reality Tip of the week Amazon Printer Server Shortcut Storage Display eBay Software as a Service Root Cause Analysis Safe Mode Reputation Content Remote Worker Two Factor Authentication Battery Emergency Video Games Music Worker Audiobook Wiring Scalability Assessment Rootkit Politics Thank You Transportation How to Television Troubleshooting Webinar Techology Congratulations Benefits Automobile Public Computer IT solutions Regulation Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *