(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Technology Privacy Network Security Managed IT Services Best Practices Business Computing Hackers Data Backup Email Hosted Solutions Malware VoIP Backup Google Outsourced IT Microsoft Software Data Recovery Business Continuity Saving Money Mobile Devices Cloud Computing Android Data Small Business IT Support Internet Cybersecurity Cybercrime Disaster Recovery Ransomware Efficiency Internet of Things IT Services Smartphones Law Enforcement Hardware Communications Tech Term BDR Innovation User Tips Business Managed IT Communication How To Data Protection Managed IT Services Router Mobile Device Management Two-factor Authentication Business Intelligence Avoiding Downtime Productivity Browser Collaboration BYOD Business Management Virtualization Phishing Computers Chrome Data Security Smartphone Mobility Redundancy Network Bandwidth Windows Remote Monitoring Spam Vulnerability Compliance App Apps Gadgets Money Proactive IT Telephone Systems Alert Windows 10 Artificial Intelligence Identity Theft Social Engineering IT Support Value Operating System Office 365 Website Applications Work/Life Balance Comparison Workers Data Storage Firewall Update Solid State Drive VPN Smart Tech Business Owner Holiday Private Cloud Budget IT Management Big Data Document Management Mobile Device Employer-Employee Relationship IT Plan Bring Your Own Device CES Social Media Unsupported Software Save Money Server Word Wi-Fi OneNote Credit Cards Computer Passwords Data Breach Flexibility Data loss Infrastructure Information Technology Spam Blocking Amazon Computing Infrastructure Authentication Data Management Screen Mirroring Technology Tips Password Manager Wireless Internet Root Cause Analysis HBO Digital Signature Amazon Web Services Sync Nanotechnology Cast Business Mangement Software as a Service Windows 10s Meetings Outlook Networking Encryption Hard Drives Online Shopping End of Support Telephony Connectivity SaaS Gmail Government Office Tips Specifications Health Frequently Asked Questions Current Events Virtual Reality Strategy Training Evernote Skype Devices Audit Recycling Analysis Millennials Excel IoT Knowledge Worker Commute Legal Wireless Charging Start Menu Thought Leadership Emails Data Warehousing Content Filtering eWaste Password Productivity Workforce The Internet of Things Tip of the week Network Congestion Charger Fiber-Optic Mobile Streaming Media Google Docs Computer Fan Recovery Criminal Accountants Telecommuting Windows Server 2008 Insurance IT Consultant Electronic Medical Records Cables Public Cloud Professional Services Content Filter Users Voice over Internet Protocol FENG Remote Work Upgrade Windows 7 Practices Leadership Save Time Unified Threat Management Risk Management Keyboard Unified Communications Tools Storage Netflix Wireless Multi-Factor Security Content Management Windows 10 Regulations Hosted Computing Cleaning Theft PDF Settings Trending Software Tips Patch Management Black Market Blockchain HaaS Servers Inventory webinar Hacking Computer Care HIPAA Cortana Google Apps Google Drive Botnet Addiction Lifestyle Wireless Technology Physical Security Scam Battery Human Resources Facebook Fraud Flash Access Control Conferencing Marketing Samsung Remote Computing Hacker Travel Cache Microsoft Office Mobile Computing Downtime Automation Education Staff Customer Relationship Management USB Scalability IP Address Benefits Internet Exlporer Customer Service Worker Loyalty Troubleshooting Office Mobile Office Wire Domains Smart Technology Content Rootkit Hosted Solution Workplace Tips Relocation Sports Public Speaking Audiobook Internet exploMicrosoft Instant Messaging Humor Lithium-ion battery Augmented Reality Files Two Factor Authentication Vendor Management Entertainment Advertising Tech Support WiFi Assessment How to Safety History Best Practice Hiring/Firing Webinar Competition Television Books Techology Fun IT solutions Public Computer Shadow IT Miscellaneous User Error Hybrid Cloud Emergency Search Employer Employee Relationship Politics Experience Twitter Presentation Quick Tips Computer Accessories Music Video Games 5G CrashOverride Managed Service Provider Colocation IBM Bluetooth Automobile Wearable Technology Transportation

      Mobile? Grab this Article!

      QR-Code dieser Seite