094 90 48200     Get SUPPORT

Aniar IT Services Blog

2 minutes reading time (325 words)

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Privacy Google Best Practices Microsoft Email Business Computing Cloud Tech Term Android Internet VoIP Data Backup How To Small Business Cloud Computing Hackers User Tips Network Security Hardware Computers Chrome Communication Malware Cybercrime Software Data Recovery Internet of Things Browser Artificial Intelligence Collaboration Innovation Cybersecurity Backup Smartphone Managed IT Services Mobile Device Management Two-factor Authentication Data Security Data Protection Word Data Ransomware Windows Efficiency Connectivity Money Vulnerability Business Management Office 365 Communications Saving Money Business Windows 10 Smartphones Spam Redundancy IT Plan Remote Monitoring Telephone Systems OneNote Mobile Devices Virtualization Social Engineering Unsupported Software Avoiding Downtime Phishing Data Storage Passwords Comparison Identity Theft Router Apps Spam Blocking Network Law Enforcement Bring Your Own Device Operating System IT Management Managed IT BDR CES Update Business Intelligence App Website Outsourced IT Infrastructure BYOD Business Continuity Content Management IT Services Upgrade Windows 7 VPN Facebook Managed IT services Smart Office Voice over Internet Protocol Charger Hosted Computing Private Cloud Travel Remote Work Blockchain Wireless Internet Root Cause Analysis Patch Management Amazon Web Services Accountants Settings Cast Tools Work/Life Balance Legal Automation Start Menu Password Manager Nanotechnology Wi-Fi Frequently Asked Questions Recovery Computer Document Management Sync Multi-Factor Security Wireless Charging Inventory Public Cloud HIPAA USB Holiday Millennials Criminal Server Data loss Business Mangement Smart Tech Computer Fan Excel Digital Signature Paperless Office Google Apps Mobile Device Software Tips Electronic Medical Records Wire Hosted Solutions Flash Google Docs Online Shopping Productivity Value Workforce Addiction The Internet of Things Credit Cards PDF Cortana Alert Gadgets Specifications Gmail FENG Microsoft Office Tip of the week Entertainment Telephony Trending Workers Access Control Data Management Sports HaaS Scam Evernote Cleaning Applications Big Data Fraud Encryption IT Support Recycling Devices Windows Server 2008 Meetings Machine Learning Authentication Solid State Drive HBO Human Resources Keyboard Practices Windows 10s Google Drive Botnet Telecommuting Cache Downtime Computer Care Amazon Screen Mirroring Social Media Disaster Recovery eWaste Thought Leadership Employer-Employee Relationship YouTube Skype Password Bandwidth Audit Physical Security Outlook Government Staff Windows 10 Public Speaking Company Culture Presentation Lithium-ion battery Hard Drives WiFi Twitter Search Augmented Reality Tech Support Managing Stress Wireless Technology 5G IBM Safety Marketing Hacker CrashOverride Productivity Budget Servers Customer Relationship Management Competition IP Address Managed Service Provider Users HVAC Hiring/Firing Customer Service Miscellaneous Mobile Office Workplace Tips Emergency Fun Domains Wireless