Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Network Security Microsoft Malware Hackers Backup Internet Windows 10 Business Email Android Smartphones Alert Data Small Business Business Continuity Browser Innovation Hosted Solutions Managed IT Services Hardware Office VoIP Ransomware Computers Disaster Recovery Business Management Smartphone Law Enforcement Cybercrime Computer Productivity Cloud Computing Outsourced IT User Tips Efficiency Tech Term Cybersecurity Collaboration Data Backup Virtualization Mobile Devices IT Services Telephone Systems Communications How To Chrome Productivity Social Media Password Quick Tips Artificial Intelligence Windows Money Work/Life Balance Communication Managed IT Services Social Engineering Miscellaneous Router App Health Passwords Private Cloud Vulnerability Spam Hacking Holiday Google Drive HaaS Two-factor Authentication Wi-Fi Mobile Device Management IT Support Data Recovery Apps Data Security Facebook Data Protection Bring Your Own Device Windows 10 Office 365 Network Automation Saving Money Office Tips Upgrade Phishing Internet of Things Data Breach Managed IT CES Website Government Gadgets Samsung Remote Computing Bandwidth Public Cloud BYOD Value Marketing Automobile Identity Theft Redundancy Infrastructure Avoiding Downtime History Data Management Worker Workplace Tips Flexibility Big Data PDF Mobility Remote Monitoring Comparison Battery Server Managed Service Provider Electronic Medical Records Microsoft Office Update Data Storage Business Intelligence Legal Charger OneNote Keyboard End of Support IT Management Patch Management Employer-Employee Relationship Applications Spam Blocking Cleaning VPN IT Plan Scam Operating System Mobile Device Word Computer Care Unsupported Software Root Cause Analysis Wearable Technology Safety How to Worker Commute Software Tips Telecommuting Benefits Conferencing Computer Accessories Entertainment Windows 7 Google Apps Botnet Content Management Voice over Internet Protocol USB Black Market Techology Practices Remote Work Firewall Emails Bluetooth Solid State Drive Scalability Addiction Flash Workers Travel Blockchain Files Meetings Troubleshooting Networking Hosted Computing Hybrid Cloud Smart Technology Audit Loyalty Cache HIPAA Multi-Factor Security Current Events Inventory Physical Security Credit Cards Apple Two Factor Authentication IT solutions Computer Fan Risk Management SaaS Wireless Internet Sync Password Manager Human Resources Data loss Trending Knowledge Access Control Fraud iPhone IT Support Rootkit The Internet of Things Politics Instant Messaging Business Mangement Staff User Error Screen Mirroring Relocation Books Network Congestion Authentication HBO Amazon Monitor Training FENG Assessment Telephony Gmail Recovery Cast Specifications IT Consultant Education Nanotechnology Information Technology Outlook Amazon Web Services Save Money Settings Recycling Vendor Management Television Skype Digital Signature Internet Exlporer Humor Emergency Leadership Computing Infrastructure Smart Tech Frequently Asked Questions Online Shopping Save Time Start Menu eWaste Data storage Public Computer Encryption Millennials Best Practice Connectivity Excel Evernote Tools Criminal Experience Users Internet exploMicrosoft Workforce Hiring/Firing Content Devices Tip of the week Wireless Charging Downtime Google Docs Music Search Virtual Reality Accountants Advertising BDR Transportation webinar Employer Employee Relationship Windows 10s Audiobook Video Games Thought Leadership Wireless Windows Server 2008 Cortana Twitter Webinar Wire Sports CrashOverride WiFi Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...