Infracore LLC Blog

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Malware Hackers Microsoft Data Hosted Solutions User Tips Innovation Software Business Hardware Backup Internet Tech Term Mobile Devices Smartphones Data Backup Business Continuity Smartphone Email Windows 10 Browser Productivity VoIP Computer Android IT Services Cloud Computing Small Business Alert Data Recovery Workplace Tips Communications Outsourced IT Business Management Managed IT Services Disaster Recovery Miscellaneous Communication Office Managed IT Services Artificial Intelligence Efficiency Router Ransomware Chrome Computers Cybercrime Network Windows 10 Law Enforcement Password Applications Facebook Virtualization Windows IT Support Productivity Money Passwords Telephone Systems Holiday Internet of Things Social Media Cybersecurity Collaboration How To Office 365 Google Drive Automation Quick Tips Saving Money Mobile Device Upgrade Word Work/Life Balance Health Server App Spam Social Engineering Gadgets Wi-Fi Information Voice over Internet Protocol Managed Service Phishing Two-factor Authentication Data Security Apps HaaS Bring Your Own Device Connectivity Save Money Office Tips IT Support Vulnerability Settings BDR Keyboard Microsoft Office Hacking Private Cloud Mobile Device Management Data Protection Mobility Scam Data Breach Avoiding Downtime Big Data Spam Blocking Content Management Computer Care Machine Learning Business Intelligence Data Management IT Plan Virtual Assistant End of Support Operating System Blockchain History Identity Theft Samsung Update Electronic Medical Records Encryption Training Unsupported Software Sports Infrastructure Bandwidth Marketing Telephone System Remote Monitoring Entertainment USB Value Software as a Service Battery Managed IT VPN PDF Firewall Networking Telephony Windows 7 Human Resources Fraud Access Control Remote Computing Google Docs Employer-Employee Relationship Botnet Charger BYOD Managed Service Provider Flexibility Data Storage Government Patch Management Comparison Servers Website CES Cleaning Legal Paperless Office OneNote Worker Automobile IT Management Public Cloud Redundancy Wiring Humor Internet Exlporer Amazon Web Services Nanotechnology Excel HVAC Vendor Hiring/Firing Files Remote Work Music Practices Best Practice IT solutions Physical Security Bing Recovery Recycling Network Congestion Tools Politics Digital Signature Rootkit Wire Printer Hybrid Cloud Workers Transportation Addiction Safety Computer Fan Sync Data storage Users Data loss Unified Threat Management Online Shopping Books Smart Tech Assessment Information Technology Tip of the week Enterprise Content Management Display Employer Employee Relationship Techology MSP Wearable Technology Hosted Computing Content YouTube Help Desk eWaste IT Consultant Downtime Millennials webinar Mouse Apple Benefits Cache Search The Internet of Things Virtual Reality Screen Mirroring Mobile Computing Internet exploMicrosoft Evernote Television Instant Messaging Windows 10s Windows Server 2008 Password Management Security Cameras Multi-Factor Security HIPAA Computer Accessories File Sharing Credit Cards Inventory Video Games Audiobook HBO WiFi Criminal Leadership Root Cause Analysis Workforce Vendor Management Conferencing Software Tips Smart Office Administrator iPhone Password Manager How to FENG Worker Commute Cast Camera Advertising Wireless Charging Emergency Devices Public Computer NIST Hacker Trending Bluetooth Augmented Reality Relocation User Error Troubleshooting Loyalty Outlook Shortcuts Save Time Education Accountants Emails Document Management Microchip Business Mangement Smart Technology Current Events Black Market Skype Staff Cortana Thought Leadership Solid State Drive Flash Cryptocurrency Monitor Remote Worker Amazon Authentication SaaS Scalability Frequently Asked Questions Social Computing Infrastructure Meetings Travel Telecommuting Experience Search Engine Gmail Two Factor Authentication Knowledge Start Menu Specifications Risk Management Wireless Internet Warranty Google Apps Wireless Audit Safe Mode CrashOverride Company Culture Thank You Compliance Managing Stress Congratulations Regulation Printers Smartwatch Webinar Twitter

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AngusCousens Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?
27 December 2018
What a good story you have written and I feel good reading about your story and we should share thin...
George Nivison Bring Your Own Device Is Great...When Applied Properly
21 December 2018
If you think you device get slow then try once again for the device sharing speed with the connectin...
Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...