window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Hosted Solutions Managed IT Services Hackers Data Recovery Malware Mobile Devices VoIP Google Email Data User Tips Outsourced IT Tech Term Internet of Things Innovation Backup Productivity Internet Microsoft Communications Cloud Computing Hardware Business Continuity IT Services BDR Saving Money Business Cybersecurity Software Efficiency Artificial Intelligence Ransomware Smartphones Communication Small Business IT Support Smartphone IT Support Managed IT Services Router Disaster Recovery Cybercrime Android Network Business Management Applications Windows 10 Gadgets Chrome Browser Workplace Tips Computer Mobile Device Collaboration Phishing Law Enforcement Managed IT How To Avoiding Downtime Data Protection Information Spam Virtualization Mobile Device Management Encryption Holiday Two-factor Authentication Proactive IT Server Money Word Mobility Access Control Business Intelligence Blockchain BYOD Windows Training Save Money Data Security Office 365 Computers Miscellaneous App Upgrade Remote Monitoring Connectivity Voice over Internet Protocol Social Media Facebook File Sharing Automation Software as a Service Private Cloud Telephone Systems Machine Learning Wi-Fi Bandwidth Managed Service Identity Theft Document Management Passwords Alert Servers Apps Compliance Productivity Analysis Vulnerability Settings Social Engineering Firewall Redundancy IT Management Data Breach Employer-Employee Relationship Google Drive IT Plan Spam Blocking Flexibility CES Sports Solid State Drive Windows 7 Password Information Technology Comparison Telephony Business Owner Unsupported Software Value Operating System Bring Your Own Device Data Storage Content Management Education Business Technology Keyboard Networking Update Paperless Office Unified Threat Management Credit Cards Smart Tech Virtual Assistant Botnet Work/Life Balance Workers Save Time Hacker Microsoft Office Budget Human Resources Fraud OneNote Telephone System Data loss Health Big Data Infrastructure Mobile Computing VPN Scam Website Google Docs Healthcare Practices Safe Mode HaaS Employee Screen Mirroring Criminal Wire Emails Printer Windows Server 2008 Telecommuting Black Market Content Filtering Vendor Professional Services Hacking Password Manager Storage Conferencing Camera HBO Instant Messaging Accountants HVAC Sync Amazon Web Services Worker Commute Cables Network Congestion MSP Multiple Versions HIPAA Digital Signature Electronic Health Records Samsung Bing Wireless Hosted Computing Downtime Digital Signage Cast Legal Entertainment Charger Mouse Remote Work Battery Computer Fan Display Tools Windows 10 Business Mangement Hard Drives Outlook USB Enterprise Content Management Help Desk Online Shopping Unified Communications Devices Electronic Medical Records IT Consultant Remote Worker Restore Data Multi-Factor Security Remote Computing Inventory Computing Infrastructure Google Search Government Smart Office Administrator Regulations FENG Security Cameras Root Cause Analysis Data Management Gmail Addiction Virtual Private Network Frequently Asked Questions Specifications Recovery IoT Password Management Shortcuts Skype Evernote Augmented Reality Theft Thought Leadership Leadership Public Cloud Wiring Backup and Disaster Recovery Software Tips Trending Strategy YouTube Windows 10s Wireless Technology Proactive Netflix Cortana Microchip NIST Employee/Employer Relationship Meetings Recycling Cache Project Management Excel Millennials eCommerce Start Menu Wireless Charging The Internet of Things Google Apps Streaming Media Managed Service Provider GDPR Physical Security Lifestyle Marketing SaaS Patch Management Authentication Current Events End of Support Remote Monitoring and Maintenance Data Warehousing WiFi Risk Management Students Cleaning Flash Insurance Cryptocurrency Smartwatch Travel eWaste Wireless Internet Warranty Tip of the week Workforce Office Tips Social Mobile Content Filter webinar PDF E-Commerce Audit Amazon Virtual Reality Fiber-Optic Nanotechnology Knowledge Line of Business File Versioning Users Staff Computer Care Technology Tips Search Engine CrashOverride Regulation Audiobook Customer Service Vendor Management Files Bluetooth Wearable Technology Mobile Office Assessment Transportation Domains Advertising Video Games Office Colocation Webinar Books Television History Automobile Twitter Printers How to Benefits Public Speaking Search Relocation Presentation Best Practice IT solutions Public Computer Techology Worker Troubleshooting Lithium-ion battery Smart Technology Scalability Loyalty Humor Emergency 5G Internet Exlporer Net Neutrality Tech Support User Error IBM Rootkit Shadow IT Hosted Solution Safety Employer Employee Relationship Hybrid Cloud Experience Company Culture ISP Utility Computing Content Customer Relationship Management Hiring/Firing Competition Computer Accessories Music IP Address Managing Stress Two Factor Authentication Fun Internet exploMicrosoft Politics Quick Tips

Mobile? Grab this Article!

QR-Code dieser Seite