XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Microsoft Privacy Internet Cloud Saving Money Backup Software Best Practices Managed Service Provider Workplace Tips Small Business Business Computing Mobile Office Hackers Google Hardware Productivity Hosted Solutions Mobile Devices Data VoIP Quick Tips Gadgets Email IT Support Malware Efficiency Social Media Network Business Management Business Continuity Business Server Smartphones Miscellaneous Innovation Virtualization Upgrade IT Services Windows Disaster Recovery Communication Network Security Users Microsoft Office Computer Communications Managed IT Services Mobile Device Management User Tips Passwords Marketing Android Holiday Browser WiFi Vendor Management Smartphone Save Money Alert Mobile Computing Windows 10 Operating System Remote Monitoring Data Backup Avoiding Downtime Bring Your Own Device Apple Information Technology Computers IT Solutions Ransomware Chrome The Internet of Things Cybercrime Outsourced IT Current Events Best Practice Going Green Remote Computing Telephone Systems BYOD History Application Firewall Trending Phone System Wireless Technology Social Engineering IT Consultant Employer-Employee Relationship Big Data Spam Hacking Health Printer Lithium-ion Battery Router Office Cloud Computing Proactive IT Data Recovery Budget App VPN Collaboration BDR Automation Excel iPhone Business Managament Managed IT Services Content Filtering Fax Server Maintenance Recovery Facebook Bandwidth Money Cybersecurity How To Windows 8 Two-factor Authentication Mobility Internet of Things Business Intelligence Analytics User Error Customer Relationship Management Humor Tutorials Mouse Virus Gmail Antivirus Unified Threat Management PowerPoint Hard Drives Outlook Artificial Intelligence Private Cloud Networking Value Memory Phishing Save Time Tablet Office Tips Inbound Marketing Website Data Management Compliance Risk Management Flexibility Apps Digital Payment Computer Repair Downtime Network Congestion Google Drive Saving Time Windows 10 Managed IT Search Conferencing Redundancy Office 365 Data Security Law Enforcement Administration Social Networking Retail Tech Support SaaS Spam Blocking Administrator Scam Piracy Leadership Intranet Data storage People Internet Exlporer Data Protection Computer Accessories Work/Life Balance HaaS Word Vulnerability End of Support Bluetooth Comparison Data Storage Webinar Statistics Sports Touchscreen Workers CES Online Currency Twitter Point of Sale Skype Settings IT Management Wireless Human Resources Physical Security Public Cloud Biometrics IT service IT Plan Hacker Best Available Wearable Technology Unsupported Software eWaste Samsung PDF Robot OneNote Wi-Fi Safety Meetings Training Social Government Data Breach Identity Theft DDoS Solid State Drive Entertainment Productivity Mobile Device Programming Document Management Black Market Credit Cards Recycling Streaming Media Environment Running Cable Video Surveillance IBM Professional Services Virtual Reality Colocation Macro Law Firm IT Shadow IT Lifestyle Shortcut Screen Mirroring Printer Server Hiring/Firing Tip of the week User Scheduling Password Manager Amazon Augmented Reality IaaS Tools Bloatware Windows 10s Hosted Solution Computing Infrastructure Charger Legal Cast 3D Windows Server 2008 USB IT Support Business Mangement Windows 8.1 Update Monitor Amazon Web Services Entrepreneur Computer Care YouTube Windows 7 Hiring/Firing Criminal Reputation Online Shopping Botnet Cost Management Audit Internet exploMicrosoft Wireless Charging NarrowBand Specifications Data Warehousing Regulations Help Desk Customers Evernote Advertising Encryption Travel Instant Messaging Computer Fan Patch Management Fiber-Optic IT Security Chromecast Millennials Servers Webcam Content Management LinkedIn nternet Notifications FENG WIndows 7 Cables Laptop Workforce SharePoint Flash Emails HIPAA Blockchain Company Culture Co-managed IT Hybrid Cloud Software as a Service Worker Commute Managing Stress Debate Unified Communications Touchpad Telecommuting Domains PC Care Sync Science Keyboard Staff Net Neutrality Relocation File Sharing Update eBay Theft Display Remote Work Alerts Software Tips Telephony Tablets Gaming Console Digital Signature Google Docs Text Messaging Virtual Desktop Windows Media Player Education Cortana Work Station Start Menu Analyitcs Netflix Upgrades Crowdfunding Uninterrupted Power Supply Voice over Internet Protocol Customer Service Root Cause Analysis HBO Consultant Supercomputer Google Apps Distributed Denial of Service Mobile 360 Files Password Print Server Cleaning Multi-Factor Security Data loss Cameras Electronic Medical Records Frequently Asked Questions Knowledge Licensing Business Owner Infrastructure Fraud Remote Support Troubleshooting Rootkit Techology Automobile Books Content Emergency Loyalty Video Games Audiobook Scalability Politics Transportation Assessment How to Benefits Television Webinar Smart Technology Public Computer IT solutions Experience CrashOverride Two Factor Authentication Employer Employee Relationship Battery Music Applications Thank You Worker Congratulations

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *