XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Google Mobile Devices Productivity Hardware Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Network Efficiency IT Support Social Media Innovation Business Management IT Services Miscellaneous Business Continuity Smartphones Server Upgrade Business Virtualization Communication Windows Disaster Recovery Computer Communications Managed IT Services Microsoft Office Data Backup User Tips Users Passwords Mobile Device Management Browser Android Marketing Save Money Smartphone Holiday Ransomware WiFi Data Recovery Alert Vendor Management Tech Term Mobile Computing Outsourced IT Internet of Things Windows 10 Cybercrime Operating System Remote Monitoring Bring Your Own Device Apple BYOD BDR Computers Information Technology Cloud Computing Avoiding Downtime Firewall Big Data Remote Computing IT Solutions Router The Internet of Things Artificial Intelligence Current Events Going Green Telephone Systems Chrome Best Practice History Automation VPN Phone System Employer-Employee Relationship Facebook Wireless Technology IT Consultant Trending Health Application Collaboration Hacking Cybersecurity Social Engineering Spam Printer Office Lithium-ion Battery Budget Managed IT Services Bandwidth Money Excel App Proactive IT Business Intelligence Windows 10 Content Filtering Two-factor Authentication Business Managament Mobility Fax Server Recovery Maintenance Unified Threat Management Windows 8 How To Networking Applications iPhone Hard Drives Training Antivirus User Error Phishing Mouse Humor Analytics Outlook Tutorials Data Protection Virus Managed IT Apps Data Security Value Private Cloud PowerPoint Sports Redundancy Law Enforcement Website Office 365 Productivity Customer Relationship Management Gmail Entertainment Information Inbound Marketing Saving Time Retail Settings Analysis Google Drive IT Support Downtime Administration File Sharing Memory Vulnerability Blockchain Connectivity Word Mobile Device Network Congestion Social Networking Conferencing Digital Payment Computer Repair Identity Theft Tablet Search Save Time Data Management Twitter Tech Support Office Tips Document Management Streaming Media Risk Management Scam IT Management Compliance Encryption Flexibility IT Plan Wireless Physical Security Skype Cleaning Password Programming Machine Learning Instant Messaging Public Cloud Social Environment SaaS Running Cable Content Management Augmented Reality Intranet Unsupported Software Infrastructure Wearable Technology Human Resources Managed Service Biometrics Touchscreen Paperless Office OneNote Data storage IT service Update eWaste Best Available Internet Exlporer Webinar Data Storage Hacker PDF Bluetooth Comparison Work/Life Balance Data Breach Windows 7 HaaS End of Support Video Surveillance People Safety Wi-Fi Virtual Assistant Government Samsung YouTube Meetings Workers Robot USB Telephone System Piracy IBM Online Currency Credit Cards DDoS Administrator Point of Sale Leadership Recycling Access Control Solid State Drive Education Data loss Smart Tech Servers Computer Accessories Statistics Black Market Fraud Spam Blocking CES Workforce Authentication MSP 360 Emails Customer Service Professional Services Google Apps Alerts Screen Mirroring Company Culture Insurance Flash Fiber-Optic Notifications Law Firm IT Smart Office Electronic Medical Records Consultant Lifestyle Tip of the week Amazon Colocation Text Messaging Storage Windows 10s Software as a Service Laptop Safe Mode Business Owner Telecommuting SharePoint Gaming Console LinkedIn Nanotechnology Remote Worker Cameras Tools Shadow IT Work Station HVAC Charger Cast Net Neutrality Practices HIPAA Sync Cables Hybrid Cloud Hiring/Firing Licensing Virtual Reality Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Virtual Private Network WIndows 7 Touchpad Windows 8.1 Update Accountants Business Technology Software Tips Remote Work Relocation Wiring Hosted Solution Printer Server Shortcut Password Manager Legal Display Enterprise Content Management Computer Care Hosted Computing Proactive Keyboard Worker Commute Telephony Unified Communications Debate Students User Monitor Bloatware Online Shopping Help Desk Cache Project Management Audit Managing Stress Domains Google Docs Staff Devices GDPR Netflix Botnet Business Mangement Password Management Science Webcam Reputation Inventory Remote Monitoring and Maintenance Start Menu Theft Healthcare Root Cause Analysis Data Warehousing Specifications IoT Supercomputer Entrepreneur Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Voice over Internet Protocol Digital Signature HBO Thought Leadership E-Commerce Travel Criminal NarrowBand NIST Tablets Customers Line of Business Windows Media Player Virtual Desktop Mobile Cortana Uninterrupted Power Supply PC Care IT Security Electronic Health Records Hiring/Firing Millennials Macro Knowledge Cost Management Wireless Charging 3D Advertising Print Server Wire FENG Multi-Factor Security Strategy Scheduling Upgrades Analyitcs Frequently Asked Questions Distributed Denial of Service Files eBay nternet Crowdfunding Content Filter Camera Patch Management Chromecast Remote Support Co-managed IT Cryptocurrency Rootkit Politics Printers Transportation How to Television Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Thank You Books Loyalty Experience Content Two Factor Authentication Battery Congratulations Emergency Video Games Music Worker Regulation Audiobook Scalability Assessment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: