(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency IT Support Business VoIP IT Services Managed Service Provider Email Miscellaneous Server Disaster Recovery Business Continuity Workplace Tips Data Windows Upgrade Innovation Network Software Hardware Business Management Network Security Save Money Saving Money Communication Computer Smartphones Android Mobile Device Management User Tips Holiday Smartphone Browser Microsoft Office communications Managed IT Services Virtualization Windows 10 Outsourced IT WiFi Operating System Data Backup Mobile Computing BYOD Small Business Computers Social Media Hacking Chrome Application IT Solutions Alert Apple Proactive IT Remote Monitoring Avoiding Downtime Cybercrime Big Data Passwords Ransomware Marketing Social Engineering The Internet of Things Automation Employer-Employee Relationship Quick Tips Office Budget Collaboration Information Technology Managed IT Services Recovery Going Green spam Remote Computing Data Recovery Telephone Systems Gadgets Health Mobility Bring Your Own Device VPN Save Time Cybersecurity Firewall App BDR Vendor Management Bandwidth Compliance How To iPhone Managed IT Cloud Computing Wireless Technology User Error Two-factor Authentication Artificial Intelligence PowerPoint Windows 10 Website Excel Phone System Money Office Tips Content Filtering Downtime History Tablet Gmail Lithium-ion battery Value Risk Management Memory Retail Search Private Cloud Antivirus Vulnerability Networking Mouse Redundancy Router Analytics IT Support Office 365 Internet of Things Workers Word Data storage Biometrics Business Intelligence Business Owner Outlook OneNote Flexibility Hard Drives Apps IT Consultant IT Management Work/Life Balance Facebook Administration Entertainment Running Cable Saving Time Document Management Physical Security DDoS Unified Threat Management Robot Skype Unsupported Software Online Currency Mobile Office Environment Google Drive Public Cloud Customer Relationship Management Phishing Printer SaaS Identity Theft Best Available Data Security People Safety Current Events Programming Government Network Congestion Credit Cards Trending Maintenance Meetings HaaS Fax Server Black Market Law Enforcement Solid State Drive Data Management Humor Statistics Intranet Data Storage Internet Exlporer Twitter Windows 8 Password Manager SharePoint Colocation Encryption Comparison Crowdfunding Windows 7 Sports Bluetooth Online Shopping Tablets Botnet Monitor Hosted Solution eWaste Computing Infrastructure Notifications Specifications Data Warehousing Regulations YouTube USB Evernote Travel Reputation Wearable Technology End of Support Mobile Device Windows Media Player Social Millennials Servers NarrowBand Wireless Charging Customers Internet exploMicrosoft Best Practice Social Networking Hiring/Firing Root Cause Analysis Workforce IT Plan Flash Chromecast WIndows 7 Fiber-Optic Analyitcs Company Culture Software as a Service Patch Management Advertising Data loss Telecommuting Windows 8.1 Update Sync Laptop Managing Stress Settings Cables Update Scam Distributed Denial of Service Virus Virtual Desktop Remote Work LinkedIn Charger Software Tips Telephony Touchpad IT service Human Resources Unified Communications Virtual Reality Debate Google Docs Relocation Hybrid Cloud Uninterrupted Power Supply Computer Accessories Training Computer Care Start Menu Print Server HIPAA Domains Theft Bloatware Spam Blocking Voice over Internet Protocol Audit IaaS Cleaning Cameras Customer Service Video Surveillance HBO Cortana Mobile Keyboard Consultant Entrepreneur Net Neutrality Education Multi-Factor Security Computer Repair Screen Mirroring Frequently Asked Questions Tech Support Printer Server Fraud Google Apps Professional Services Hacker Worker Commute Cost Management Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Applications Amazon Infrastructure Tools User Wireless Files Science Streaming Media Password Instant Messaging Touchscreen Licensing FENG Data Protection Productivity Windows Server 2008 Wi-Fi Shortcut Amazon Web Services Samsung Troubleshooting Techology Electronic Medical Records Public Computer Business Mangement Legal Employer Employee Relationship Data Breach Automobile Recycling Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Users Battery Experience Two Factor Authentication Assessment Music Television