(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 25 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Network Security Privacy Technology Best Practices Business Computing Hackers Outsourced IT VoIP Microsoft Software Backup Email Data Backup Google Malware Business Continuity Mobile Devices Saving Money Hosted Solutions Small Business IT Support Disaster Recovery Android Data Recovery Cloud Computing Business How To Smartphones Cybersecurity Hardware Data Efficiency Innovation Managed IT Communication Internet of Things Chrome Cybercrime Law Enforcement Communications Ransomware Managed IT Services Two-factor Authentication Avoiding Downtime BDR User Tips BYOD Virtualization Social Engineering Proactive IT Internet Telephone Systems Computers Business Intelligence Business Management Windows 10 Phishing Mobility IT Services Windows Remote Monitoring Router Spam Mobile Device Management App Data Security Compliance Gadgets Browser Money Collaboration Alert Productivity Social Media Data Storage Artificial Intelligence Save Money Server Wi-Fi Bring Your Own Device Computer Passwords Flexibility IT Management Information Technology Smartphone OneNote IT Plan CES Network Office 365 Data Breach Work/Life Balance Unsupported Software Spam Blocking Identity Theft Word Operating System Value Credit Cards Bandwidth Workers Solid State Drive Vulnerability Apps Business Owner Redundancy Budget Holiday Private Cloud Firewall Data Protection Document Management Employer-Employee Relationship Comparison Save Time Online Shopping Telephony Network Congestion Upgrade Charger Risk Management Gmail Government Computer Fan Frequently Asked Questions Wireless Specifications Evernote Skype IT Consultant Windows 10 Electronic Medical Records Recycling Update PDF FENG Excel Black Market Millennials Hacking Wireless Charging HaaS Start Menu Leadership Unified Threat Management Keyboard HIPAA eWaste Cortana Google Drive Netflix Data Warehousing Workforce Facebook Tip of the week Wireless Technology Battery Fiber-Optic Mobile Hacker Marketing Criminal Remote Computing Google Docs Settings Telecommuting Windows Server 2008 Microsoft Office Patch Management Education Data Management Cables Professional Services Computing Infrastructure webinar Computer Care Voice over Internet Protocol Technology Tips Remote Work Windows 7 Website Scam Applications Unified Communications Tools Conferencing Samsung Content Management Multi-Factor Security Downtime Regulations Theft Hard Drives End of Support IT Support Software Tips Blockchain Trending Virtual Reality Office Tips Root Cause Analysis Servers Health Google Apps Botnet Windows 10s Physical Security Human Resources Lifestyle Worker Commute Fraud Meetings Flash Networking Infrastructure Legal Travel Data loss SaaS Staff Mobile Computing Amazon Password Productivity Current Events The Internet of Things Training Password Manager Screen Mirroring Audit HBO Digital Signature Recovery Amazon Web Services Sync Knowledge Big Data Users Business Mangement Mobile Device Software as a Service Public Cloud Emails Cast Outlook Content Filtering User Error Hybrid Cloud Webinar Television Books Search Politics IT solutions Quick Tips Public Computer Presentation Video Games WiFi 5G Emergency Automobile Managed Service Provider Colocation IBM Employer Employee Relationship Cleaning Experience Customer Relationship Management Computer Accessories IP Address Music Scalability CrashOverride Internet Exlporer Customer Service Bluetooth Mobile Office Wearable Technology Office Automation Domains Transportation Content USB Workplace Tips Relocation Public Speaking Benefits Worker Audiobook Internet exploMicrosoft Humor Lithium-ion battery Loyalty Troubleshooting Instant Messaging Augmented Reality Files Smart Technology Tech Support Rootkit Entertainment Advertising Safety Hosted Solution How to History Best Practice Hiring/Firing Competition Techology Fun Two Factor Authentication Vendor Management Miscellaneous Assessment Encryption Shadow IT

      Mobile? Grab this Article!

      QR-Code dieser Seite