window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Managed IT Services Privacy Network Security Business Computing Data Backup Hackers Email Malware VoIP Outsourced IT Hosted Solutions Data Recovery Google Backup Tech Term Mobile Devices Microsoft Data Software Cloud Computing Internet of Things Innovation Saving Money Business Continuity Android Small Business Efficiency BDR Cybersecurity IT Support Hardware Internet Disaster Recovery Communications IT Services Ransomware User Tips Smartphones Cybercrime Law Enforcement Router Communication Managed IT Artificial Intelligence Gadgets How To Business Network Managed IT Services Applications BYOD Phishing Chrome Computers Browser Avoiding Downtime Business Intelligence Productivity Virtualization IT Support Smartphone Data Security Mobile Device Management Collaboration Money Windows Business Management Two-factor Authentication Data Protection Windows 10 Analysis Passwords Vulnerability Save Money Apps Productivity Social Engineering Identity Theft Word Office 365 Remote Monitoring Connectivity App Facebook Telephone Systems Social Media Mobility Spam Document Management Bandwidth Proactive IT IT Management Redundancy Blockchain Compliance Computer Alert IT Plan Workers Windows 7 Firewall Comparison OneNote VPN Unsupported Software Training Infrastructure Microsoft Office Data Storage Budget Data Breach Big Data Employer-Employee Relationship Website Update Servers Credit Cards CES File Sharing Spam Blocking Miscellaneous Business Owner Automation Upgrade Solid State Drive Information Flexibility Encryption Machine Learning Information Technology Holiday Password Education Bring Your Own Device Content Management Data loss Private Cloud Value Operating System Server Mobile Device Paperless Office Work/Life Balance Access Control Wi-Fi Networking Smart Tech Patch Management Augmented Reality Voice over Internet Protocol Risk Management Virtual Assistant Google Apps Streaming Media Sync Amazon Web Services Human Resources Cast Students Software as a Service Managed Service Provider Authentication Remote Work SaaS Wireless Technology Wireless Internet Tools End of Support Current Events Insurance Outlook Cryptocurrency Workplace Tips Cleaning Settings Remote Monitoring and Maintenance eWaste Virtual Reality Scam The Internet of Things Multi-Factor Security Marketing Hacker Telephone System Content Filter Telephony Online Shopping Staff Healthcare Government PDF webinar Fiber-Optic Nanotechnology Regulations Health Office Tips Black Market Content Filtering Audit Criminal Root Cause Analysis Wire Hacking Knowledge Practices Frequently Asked Questions Safe Mode Specifications Technology Tips Instant Messaging Computer Care Line of Business Worker Commute Accountants Software Tips HVAC Trending HIPAA Emails Password Manager Storage Skype Evernote HaaS Digital Signature Electronic Health Records Google Drive Legal Entertainment Users Conferencing Cables Battery Meetings Sports Botnet Network Congestion Hosted Computing Excel Millennials USB Samsung MSP Downtime Physical Security Enterprise Content Management Lifestyle Remote Computing Charger Business Mangement Start Menu Wireless Charging Computer Fan Data Warehousing Hard Drives Unified Communications Devices Flash Fraud Smart Office Travel Data Management Electronic Medical Records IT Consultant Inventory Tip of the week Workforce Recovery Wireless Computing Infrastructure Windows 10 IoT Password Management Mobile Computing Keyboard Managed Service Gmail Addiction Mobile FENG Strategy YouTube Google Docs Business Technology Theft Thought Leadership Amazon Screen Mirroring Public Cloud Leadership Windows Server 2008 Telecommuting Windows 10s Professional Services Save Time HBO NIST Cortana Unified Threat Management Netflix Proactive Recycling Cache Company Culture Rootkit User Error Hybrid Cloud Content Employer Employee Relationship Tech Support 5G IBM Music Safety Managing Stress Hiring/Firing Politics Audiobook Computer Accessories Fun Internet exploMicrosoft Two Factor Authentication Customer Relationship Management Quick Tips Wearable Technology Competition Transportation CrashOverride Video Games Vendor Management IP Address Regulation Bluetooth Files Books Assessment Advertising Automobile Customer Service Office How to Benefits Webinar Mobile Office Twitter Colocation Television Domains WiFi Best Practice History Search Relocation Troubleshooting Remote Worker Smart Technology Scalability IT solutions Emergency Public Computer Public Speaking Worker Techology Humor Shadow IT Hosted Solution Loyalty Presentation Wiring Internet Exlporer Experience Lithium-ion battery

      Mobile? Grab this Article!

      QR-Code dieser Seite