Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 23 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Technology Network Security Business Computing Managed IT Services Hackers Backup Hosted Solutions Software VoIP Malware Outsourced IT Google Microsoft Business Email Business Continuity Data Data Backup Disaster Recovery IT Support Windows 10 Smartphones Android Efficiency Mobile Devices Saving Money Cloud Computing Cybercrime Ransomware Browser Communications Internet Innovation Productivity IT Services Data Recovery Hardware Small Business Alert Computer Business Management Office Computers Server Cybersecurity Internet of Things User Tips Law Enforcement BDR Smartphone Managed IT Virtualization Work/Life Balance Passwords Communication Tech Term How To Telephone Systems Productivity Mobility Collaboration Chrome App Social Media Health Remote Monitoring Password Avoiding Downtime Business Intelligence Phishing Firewall Budget Quick Tips Managed IT Services Data Protection Social Engineering Wi-Fi Save Money Flexibility Holiday Hacking Data Security Mobile Device Management Office Tips Private Cloud Windows Artificial Intelligence Data Breach Automation Money Miscellaneous Applications Bandwidth Value Identity Theft Office 365 BYOD Compliance Mobile Device Recovery Information Technology Big Data Redundancy Network Spam HaaS Router Bring Your Own Device Vulnerability Proactive IT Facebook Gadgets Apps Two-factor Authentication Battery Public Cloud Data Management Computer Care Website VPN Data Storage Employer-Employee Relationship Microsoft Office Legal CES Computing Infrastructure HIPAA Black Market Windows 10 PDF Worker Word Marketing Government OneNote Google Drive Content Filtering Credit Cards IT Management Spam Blocking SaaS Business Owner Smart Tech Two Factor Authentication Training Solid State Drive History IT Plan Operating System End of Support Keyboard Document Management Infrastructure Unsupported Software Save Time Electronic Medical Records Charger Workers Comparison Update Remote Computing Patch Management Managed Service Provider Data loss Hiring/Firing Scam Automobile Cleaning Risk Management Upgrade Workplace Tips Windows Server 2008 Computer Fan Analysis Troubleshooting Workforce Transportation Fiber-Optic Mobile Cast Leadership Authentication Computer Accessories eWaste Politics Instant Messaging Humor Education Windows 7 The Internet of Things Safety Hybrid Cloud Telecommuting Benefits Cables Professional Services Nanotechnology Bluetooth Samsung Criminal Colocation Voice over Internet Protocol Netflix Regulations FENG Accountants Hosted Solution Remote Work Smart Technology Unified Communications Tools Connectivity Settings Devices Multi-Factor Security Search Virtual Reality Techology Networking Theft Data Warehousing Best Practice webinar Loyalty Thought Leadership Content Management hacker Trending How to Worker Commute Servers IBM IoT Rootkit Hard Drives Cortana Files Botnet Conferencing Streaming Media Blockchain Internet Exlporer Lifestyle Fraud Flash Supercomputer Google Apps Content Travel Wireless Technology IT Support Content Filter Human Resources Mobile Computing Downtime Shadow IT Amazon Root Cause Analysis Insurance Books Vendor Management User Error Audiobook Outlook Windows 10s Assessment Storage Staff Internet exploMicrosoft Experience Amazon Web Services Apple Sync Current Events Practices Password Manager Entertainment Software as a Service Software Tips Video Games Frequently Asked Questions Television Digital Signature Music Emergency Online Shopping iPhone Telephony Meetings Knowledge Hosted Computing Wireless Business Mangement Physical Security Excel Audit Public Computer Addiction Encryption Advertising Wearable Technology Specifications Evernote Skype Network Congestion Inventory Unified Threat Management Gmail Scalability Emails Tip of the week Cache Strategy USB Millennials Relocation Wireless Charging Start Menu Screen Mirroring Users Access Control Employer Employee Relationship Recycling Google Docs HBO Wireless Internet IT solutions CrashOverride Robot Twitter WiFi Webinar

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *