ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Google Hackers Cloud Backup Microsoft Innovation Small Business Email Network Security Internet Android Ransomware Efficiency Malware Data Smartphones Hardware Software Business Cybercrime Cybersecurity Cloud Computing VoIP Smartphone Computers Windows Mobile Devices How To User Tips Browser Data Backup Mobile Device Management Productivity Business Management Managed IT Services Business Continuity Chrome Social Engineering Data Protection Outsourced IT Gadgets Alert Collaboration Upgrade Managed IT Services Data Recovery Bandwidth Windows 10 Communication Telephone Systems Internet of Things Computer Tech Term Operating System Social Media Phishing Spam Data Breach App Server Network Data Security Money Vulnerability Automation Disaster Recovery Two-factor Authentication Safety Bring Your Own Device Law Enforcement Redundancy Virtualization Miscellaneous Avoiding Downtime BDR The Internet of Things Comparison Hosted Solutions Data Storage Artificial Intelligence IT Management Physical Security Remote Monitoring Business Intelligence Private Cloud OneNote IT Plan Google Drive Update Cleaning Public Cloud Downtime Wi-Fi Productivity CES Unsupported Software Windows 10 Apps Office 365 Recovery Communications Spam Blocking Quick Tips VPN BYOD Saving Money Word Identity Theft Internet Exlporer Router Data storage Government Passwords Save Money Gmail IT Services Password Manager Screen Mirroring Reputation Humor Travel Budget YouTube Holiday Apple Trending End of Support Amazon Computer Fan Business Mangement Cast Customer Netflix Flexibility Digital Signature iPhone Internet exploMicrosoft Amazon Web Services FENG Sync Marketing Recycling Hacking Monitor Current Events Specifications IT Support Going Green Uninterrupted Power Supply Encryption Managed Service Provider Advertising Online Shopping Black Market Automobile Data Management eWaste Knowledge NarrowBand Office Tips Legal Accountants Evernote Telephony Work/Life Balance Criminal Network Congestion Wireless Technology Millennials Settings Keyboard Health Wireless Charging Skype Sports Microsoft Office Facebook IT Consultant Workforce Frequently Asked Questions Tech Support Mobile Device Practices Hybrid Cloud Cortana Root Cause Analysis Robot Start Menu Big Data Electronic Medical Records Content Management Software Tips Google Docs Telecommuting Laptop Excel Charger Shadow IT Hosted Computing Files PDF Google Apps Tools Chromecast Blockchain Office Website webinar History Remote Work Windows 10s Touchpad Tip of the week Computer Care Inventory Employer-Employee Relationship Meetings Networking Hiring/Firing Password HIPAA Relocation Voice over Internet Protocol Conferencing Windows Server 2008 Samsung Access Control Workers Managed IT IBM Patch Management DDoS Human Resources HBO Emails User Error Credit Cards Solid State Drive Windows 7 Value Authentication Infrastructure Data loss Outlook Botnet Supercomputer Scam HaaS Staff Multi-Factor Security Fraud Audit Flash Users Wireless Transportation Bluetooth IT Support IT solutions SaaS Smart Tech Virtual Reality Benefits Connectivity Firewall Worker Commute Worker Risk Management Mobility Devices Assessment Wearable Technology Search Smart Technology Rootkit Politics Thought Leadership Television USB How to Two Factor Authentication Training Best Practice CrashOverride Public Computer Troubleshooting WiFi Vendor Management Experience Music Video Games Battery Books Save Time Scalability Education Information Technology Remote Computing Emergency Content Workplace Tips Computing Infrastructure Employer Employee Relationship Audiobook Techology Instant Messaging Thank You Applications Computer Accessories Entertainment Webinar Loyalty Congratulations Nanotechnology