ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Microsoft Cloud Backup Small Business Email Innovation Hardware Android Business Smartphones How To Windows Malware Data Software Data Backup Cybercrime Ransomware Efficiency VoIP Chrome User Tips Internet Business Continuity Mobile Devices Social Engineering Cybersecurity Computers Productivity Network Security Managed IT Services Business Management App Computer Spam Data Breach Two-factor Authentication Money Law Enforcement Browser Server Outsourced IT Automation Alert Data Recovery Collaboration Disaster Recovery Managed IT Services Safety Communication Bring Your Own Device Cloud Computing Mobile Device Management Windows 10 Gadgets Operating System Upgrade Social Media Telephone Systems Smartphone Word Phishing Spam Blocking Downtime Router Government Windows 10 Recovery Data Security Vulnerability Quick Tips Redundancy Saving Money Avoiding Downtime Network Internet Exlporer Data storage Passwords BDR Save Money Physical Security Artificial Intelligence Data Storage Private Cloud Google Drive IT Management Miscellaneous The Internet of Things Wi-Fi Public Cloud OneNote Hosted Solutions Bandwidth Communications Office 365 Unsupported Software Office Tips Remote Work Tip of the week Office Root Cause Analysis Internet of Things Employer-Employee Relationship Voice over Internet Protocol History Software Tips Wireless Technology Charger Cleaning Identity Theft Windows Server 2008 Password Relocation Sports Workers Managed IT BYOD webinar Windows 10s Computer Care Tech Support Credit Cards Windows 7 Meetings Robot Networking Infrastructure Botnet Hiring/Firing Multi-Factor Security User Error Conferencing Laptop Samsung Shadow IT Fraud Flash Travel HaaS IBM Password Manager Patch Management Chromecast Trending IT Services HBO Emails Reputation Solid State Drive Touchpad Value Amazon Apple Data loss Supercomputer Holiday Scam Comparison End of Support Customer Audit Amazon Web Services Sync Flexibility iPhone Screen Mirroring Budget DDoS Specifications Internet exploMicrosoft Hacking Computer Fan Online Shopping Marketing Remote Monitoring Managed Service Provider Cast Outlook Netflix Business Intelligence Advertising FENG Gmail Evernote Automobile Telephony Update Humor Current Events YouTube IT Support Millennials Wireless Charging Work/Life Balance Skype Virtualization Health Knowledge Keyboard Workforce Frequently Asked Questions Cortana Microsoft Office Start Menu Facebook Google Docs IT Plan Monitor Network Congestion Settings Going Green Uninterrupted Power Supply Telecommuting Apps Excel Hybrid Cloud Black Market Google Apps Tools Productivity Website Files IT Consultant NarrowBand Vendor Management Battery PDF Big Data Electronic Medical Records Scalability Education Information Technology Content Books Save Time Workplace Tips Computing Infrastructure Techology Audiobook Emergency Instant Messaging Applications VPN Entertainment Employer Employee Relationship Users Wireless IT Support Remote Computing Business Mangement Computer Accessories Webinar Loyalty Virtual Reality Recycling Transportation Bluetooth IT solutions SaaS Worker Commute Thank You Mobility eWaste Risk Management Benefits Search Congratulations Firewall Legal Politics Worker How to Assessment Wearable Technology Smart Technology WiFi Best Practice Rootkit Television USB Experience Two Factor Authentication Mobile Device Training CrashOverride Public Computer Troubleshooting Music Data Management Video Games