ct logo wslogan

2 minutes reading time (325 words)

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Business Computing Cloud Hackers Backup Microsoft Innovation Malware Email Tech Term Internet Android Mobile Devices Data Small Business VoIP Network Security Cybercrime Ransomware Hardware Smartphones Windows Business Cloud Computing Efficiency Data Backup Software How To Browser Cybersecurity Smartphone Internet of Things Computers Business Management User Tips Communications Computer Upgrade Chrome Business Continuity Productivity Mobile Device Management Automation Money Artificial Intelligence Router Managed IT Services Collaboration Hosted Solutions Data Recovery Network Law Enforcement Communication Social Engineering Social Media Disaster Recovery Data Security Two-factor Authentication Alert Save Money Bring Your Own Device Phishing App BDR Data Breach Spam Gadgets Office 365 Windows 10 Outsourced IT Safety Vulnerability Data Protection Bandwidth Saving Money Managed IT Services Server Word Telephone Systems Connectivity Operating System Password Remote Monitoring Identity Theft Managed IT Miscellaneous Business Intelligence Unsupported Software Quick Tips Cleaning Update Passwords Windows 7 Infrastructure Sports Applications Productivity Spam Blocking Gmail CES YouTube Wi-Fi BYOD Microsoft Office Windows 10 IT Services Recovery Data storage Data Storage IT Support Content Management Physical Security Networking Virtualization The Internet of Things Apps Redundancy Avoiding Downtime VPN Private Cloud Comparison Government IT Management Downtime Website Blockchain Google Drive Paperless Office OneNote Public Cloud IT Plan Internet Exlporer Facebook Inventory Office Tips eWaste Machine Learning Reputation Windows Server 2008 Patch Management DDoS Automobile Workers Wireless Internet Hybrid Cloud Audit Workplace Tips USB Encryption Laptop Telephone System Apple IT Consultant Wireless Technology Telephony Evernote Devices End of Support Legal Human Resources Password Management Budget Screen Mirroring Access Control Files Criminal Customer Root Cause Analysis Scam Credit Cards Software Tips Work/Life Balance Botnet Wire Monitor PDF Computer Fan HBO Millennials Accountants Touchpad iPhone Skype Wireless Charging Thought Leadership Internet exploMicrosoft Charger Keyboard Multi-Factor Security Staff NIST Office Cast Authentication Black Market History Netflix Tech Support HaaS Entertainment Hacking Marketing Flash Fraud webinar Travel Password Manager Smart Office FENG Frequently Asked Questions Big Data Workforce Managed Service Provider Start Menu Electronic Medical Records Cortana Advertising Computer Care Windows 10s Mobile Device Trending Cryptocurrency Relocation Current Events Amazon Nanotechnology Shadow IT Holiday Google Docs Servers Meetings Conferencing Business Mangement Document Management Excel Telecommuting Practices Chromecast Tools Google Apps Addiction Outlook Samsung Safe Mode Knowledge Sync Amazon Web Services Smart Tech User Error Flexibility HVAC IBM Hosted Computing Health Emails Uninterrupted Power Supply Going Green Recycling Tip of the week Remote Work Hiring/Firing Employer-Employee Relationship Cache Humor Value Solid State Drive Specifications Digital Signature Virtual Assistant Network Congestion Online Shopping Robot Settings Voice over Internet Protocol HIPAA Enterprise Content Management Supercomputer Data loss Data Management NarrowBand Webinar Content Wireless Public Computer CrashOverride Search Employer Employee Relationship Loyalty Computing Infrastructure Two Factor Authentication Vendor Management Thank You Politics Bluetooth IT solutions Techology Audiobook Company Culture How to Computer Accessories SaaS Instant Messaging Troubleshooting Congratulations Best Practice WiFi Managing Stress Transportation Information Technology Users Twitter Experience Benefits Worker IT Support Assessment Books Virtual Reality Save Time Video Games Music Battery Firewall Rootkit Television Remote Computing Emergency Worker Commute Scalability Wearable Technology Education Smart Technology Training Mobility Risk Management