Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Software Business computing Microsoft Google Windows 10 Backup Hackers Network Security Smartphones Malware Business Android Alert Managed IT Services Small Business Business Continuity Innovation Hardware Data Email Office Hosted Solutions Disaster Recovery Browser VoIP Ransomware Outsourced IT Internet Business Management Computers Computer Chrome Efficiency Telephone Systems Law Enforcement User Tips Data Backup Mobile Devices Cloud Computing Cybercrime Virtualization Productivity Smartphone How To Productivity Health Passwords IT Services Password Social Media Quick Tips Money Social Engineering Communications Cybersecurity Collaboration Managed IT Services Windows Miscellaneous Work/Life Balance App Two-factor Authentication Bring Your Own Device Data Breach Private Cloud Office 365 Google Drive HaaS Spam Artificial Intelligence IT Support Data Recovery Hacking Facebook Holiday Communication Wi-Fi Office Tips Windows 10 Upgrade Router Electronic Medical Records Server IT Management Employer-Employee Relationship Spam Blocking Microsoft Office IT Plan Phishing Operating System Word Government Gadgets Unsupported Software Legal Charger Keyboard Public Cloud Patch Management Marketing Vulnerability Samsung Comparison Scam Value Computer Care History Mobile Device Management Flexibility Redundancy Avoiding Downtime Business Intelligence PDF Remote Computing Mobility Managed Service Provider Data Security Remote Monitoring Automobile Internet of Things Automation Data Management Network Worker Saving Money Workplace Tips CES End of Support Big Data Apps Data Storage OneNote Battery Remote Work Workers Training Excel Tools Education Blockchain Advertising Save Money Identity Theft Wireless Infrastructure Vendor Management Tip of the week Computing Infrastructure Downtime HIPAA Multi-Factor Security Emergency Save Time webinar Credit Cards Windows 10s Password Manager Techology Windows Server 2008 Managed IT Applications Root Cause Analysis Human Resources Safety Trending Software Tips Best Practice Conferencing Fraud Business Mangement Cleaning Files Experience Windows 7 Botnet Users Staff Bandwidth Hybrid Cloud Amazon Hiring/Firing Content BYOD Mobile Device Emails Solid State Drive Gmail Music Flash Search Apple Travel Virtual Reality Meetings Data Protection Networking Specifications Transportation Amazon Web Services Employer Employee Relationship Audiobook Video Games Audit Recycling Loyalty Wearable Technology How to iPhone Worker Commute Digital Signature Current Events Benefits Online Shopping Computer Accessories Entertainment Physical Security IT solutions Computer Fan eWaste SaaS User Error USB Relocation Sync Black Market Data loss Knowledge Millennials Firewall Evernote Bluetooth Monitor Scalability IT Support The Internet of Things Criminal Troubleshooting Screen Mirroring Network Congestion Workforce Information Technology Smart Technology Wireless Charging HBO FENG Assessment Google Docs Internet Exlporer Humor Telephony Recovery Cast IT Consultant BDR Two Factor Authentication Cortana Data storage Risk Management Outlook Settings Television Website Skype Update Leadership Telecommuting Google Apps Rootkit Politics Frequently Asked Questions Instant Messaging Content Management Public Computer Voice over Internet Protocol Internet exploMicrosoft Books Start Menu Thank You CrashOverride Congratulations Webinar Encryption WiFi

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...