1047 Glenbrook Way Suite 112 Hendersonville, TN 37075

service@geekzuprepairs.com

Understanding the differences between Mac and PC

differences between Mac and PC

When it comes to choosing a computer, the decision often boils down to two main options: Mac or PC. Macintosh computers, commonly known as Macs, are designed and manufactured by Apple, while PCs, short for personal computers, are typically associated with computers running Microsoft Windows or other operating systems. Each platform has its own unique features, advantages, and considerations. In this blog, we will explore the differences between Mac and PC to help you make an informed decision.

Operating Systems

One of the most noticeable differences between Mac and PC is the operating system. Macs run macOS, a proprietary operating system developed by Apple, known for its sleek and intuitive user interface. PCs, on the other hand, have various options, including Microsoft Windows, which is the most widely used operating system, offering compatibility with a wide range of software and hardware.

Hardware and Design

Macs are renowned for their sleek and stylish designs, often characterized by slim profiles and high-quality materials. Apple places a strong emphasis on aesthetics and build quality, resulting in visually appealing computers. PCs, on the other hand, come in a wide range of designs and form factors from various manufacturers, allowing for more customization options.

Software Compatibility

Software compatibility is an important consideration when choosing between Mac and PC. Macs have excellent compatibility with Apple’s own software and applications, including productivity tools like Pages, Numbers, and Keynote. However, some third-party software may have limited availability or require specific versions for Mac compatibility. PCs, being more widely used, generally have broader software compatibility, including a wide range of productivity, gaming, and specialized software.

Gaming

If gaming is a priority for you, PCs have traditionally been the preferred choice due to their extensive gaming libraries and compatibility with a wide range of hardware configurations. While Macs have made strides in recent years with improved gaming performance and availability of Mac-compatible games, PCs still offer a broader selection and more flexibility for gaming enthusiasts.

Customization and Upgradability

PCs have long been known for their customization options and upgradability. Users can choose from a wide variety of components, such as processors, graphics cards, and storage options, and easily upgrade or replace them as needed. Macs, on the other hand, are typically less customizable and have limited upgrade options, with Apple prioritizing a streamlined user experience and optimized hardware-software integration.

price

Price is often a significant factor in the decision-making process. Macs are generally considered premium devices, with higher price points compared to PCs. PCs, being available from various manufacturers and offering a wide range of configurations, can cater to different budget ranges, from budget-friendly options to high-performance gaming or workstation setups.
Here are some additional resources to learn more about the differences between Mac and PC:

conclusion

Ultimately, the choice between Mac and PC depends on your specific needs, preferences, and intended usage. Consider factors such as software compatibility, design preferences, customization options, and budget when making your decision. Both Mac and PC offer their own strengths and cater to different user preferences, so take the time to evaluate your requirements and make an informed choice that best aligns with your needs.

How to protect your computer from ransomware attacks

protect your computer from ransomware attacks

Ransomware attacks have become an increasingly prevalent and damaging form of cyber threat. These malicious attacks can encrypt your files and hold them hostage until you pay a ransom. To protect your computer and data from ransomware attacks, it’s crucial to implement effective security measures. In this blog, we will explore essential steps you can take to safeguard your computer from ransomware attacks.

Keep Your Software Up to Date

Regularly updating your operating system, software applications, and security patches is crucial for protecting against ransomware attacks. Software updates often include important security fixes that address vulnerabilities that attackers could exploit. Enable automatic updates whenever possible to ensure your computer is always running the latest, most secure versions of software.

Use Robust Antivirus and Anti-Malware Software

Installing reputable antivirus and anti-malware software is essential for defending against ransomware attacks. These security tools scan your system for malicious programs, detect and remove potential threats, and provide real-time protection against ransomware. Choose a trusted antivirus solution and keep it updated to effectively protect your computer.

Exercise Caution with Email Attachments and Links

Email remains a common vector for ransomware attacks. Exercise caution when opening email attachments or clicking on links, especially if they come from unknown or suspicious sources. Be wary of unexpected emails, requests for personal information, or urgent messages that create a sense of urgency. Verify the sender’s identity before interacting with any email attachments or links.

Backup Your Data Regularly

Regularly backing up your important data is one of the most effective defenses against ransomware attacks. In the event of an attack, having up-to-date backups ensures you can restore your files without paying the ransom. Use both local and off-site backup solutions to maintain multiple copies of your data. Ensure the backup storage is disconnected from your computer network to prevent ransomware from infecting the backup as well.

Enable Firewall Protection

Enable and configure a robust firewall on your computer and network. A firewall acts as a barrier between your computer and external networks, monitoring and controlling incoming and outgoing traffic. It helps block unauthorized access and potentially malicious connections, reducing the risk of ransomware infiltration.

Update and Secure Remote Desktop Protocol (RDP)

Ransomware attackers often exploit vulnerabilities in Remote Desktop Protocol (RDP) to gain unauthorized access to computers. Keep your RDP client and server updated with the latest security patches. Implement strong passwords and enable multi-factor authentication for RDP connections to add an extra layer of security.

Use Strong and Unique Passwords

Creating strong, unique passwords for your accounts is a fundamental practice in preventing ransomware attacks. Avoid using common passwords or reusing passwords across multiple accounts. Consider using a password manager to generate and securely store complex passwords for different online services.

Enable User Account Control (UAC)

User Account Control is a security feature available in Windows that prompts you for permission when making changes to your computer. By enabling UAC, you add an extra layer of protection against unauthorized changes, including ransomware attempting to modify system files.

Educate Yourself and Stay Informed

Staying informed about the latest ransomware threats and techniques is crucial in maintaining your computer’s security. Stay updated with cybersecurity news, follow reputable blogs, and subscribe to security newsletters to stay informed about emerging threats and best practices for protection.
Here are some additional resources to learn more about protecting your computer from ransomware attacks:

conclusion

By implementing these strategies and staying vigilant, you can significantly reduce the risk of falling victim to ransomware attacks. Protecting your computer and data requires a multi-layered approach that combines technological measures, safe online practices, and regular backups. Remember, prevention is key when it comes to ransomware attacks, so take the necessary steps to secure your computer and maintain a proactive stance against cyber threats.

The benefits of using a password manager

benefits of using a password manager

In today’s digital age, we rely on countless online accounts and services, each requiring a unique username and password. Remembering and managing all these credentials can be a daunting task. This is where a password manager comes in handy. A password manager is a tool that securely stores and manages your passwords, making your online life more convenient and secure. In this blog, we will explore the benefits of using a password manager and why it’s an essential tool for modern-day cybersecurity.

Simplifies Password Management

One of the primary benefits of a password manager is that it simplifies password management. With a password manager, you no longer need to remember multiple complex passwords or resort to using the same weak password for different accounts. You can store all your passwords in one secure location, accessible through a master password or biometric authentication.

Generates Strong and Unique Passwords

A password manager can generate strong, complex, and unique passwords for each of your accounts. These passwords are typically long, random combinations of letters, numbers, and symbols, making them highly resistant to brute-force attacks. By using unique passwords for each account, you reduce the risk of one compromised account affecting others.

Enhances Security

Using a password manager significantly enhances your online security. Since it generates and stores strong passwords, you’re less likely to fall victim to common password-related attacks, such as dictionary attacks or password guessing. Additionally, password managers often encrypt your passwords and employ advanced security measures, such as two-factor authentication, to further protect your data.

Enables Convenient Auto-Fill and Form Completion

Password managers offer convenient auto-fill functionality, automatically populating your login credentials when you visit websites or applications. This saves time and eliminates the need to manually enter usernames and passwords. Some password managers can also auto-fill forms, saving you from repetitive data entry for shipping addresses, billing information, and more.

Syncs Across Devices

Password managers typically synchronize your passwords across multiple devices, such as computers, smartphones, and tablets. This means you can access your passwords from anywhere, ensuring a seamless and consistent experience across all your devices. Syncing also simplifies the process of updating or changing passwords since the changes propagate across all synced devices.

Encourages Good Password Practices

Password managers promote good password practices by discouraging the use of weak or easily guessable passwords. They often provide password strength indicators and alerts for weak or reused passwords. By encouraging better password habits, password managers help you maintain a higher level of security across your online accounts.
Here are some reputable password manager tools you can explore:

Understanding the basics of computer programming

Basic computer programming

In today’s technology-driven world, computer programming is a highly valuable skill that empowers individuals to create software, build websites, automate tasks, and solve complex problems. Whether you’re a beginner exploring programming for the first time or someone curious about the fundamentals, understanding the basics of computer programming is essential. In this blog, we will explore the key concepts and elements of programming to provide you with a solid foundation.

What is Computer Programming?

Computer programming involves writing instructions that a computer can understand and execute. It is the process of creating a set of logical and sequential steps to solve a specific problem or perform a desired task. Programming languages, such as Python, Java, C++, and JavaScript, provide the tools and syntax for writing these instructions.

Programming Concepts

a.Variables: Variables are used to store and manipulate data. They hold values that can be modified throughout the program’s execution. b. Data Types: Data types define the kind of data a variable can hold, such as numbers, strings, or Boolean values. c. Control Structures: Control structures, like conditional statements (if-else) and loops (for, while), allow programmers to make decisions and repeat actions based on certain conditions. d. Functions: Functions are reusable blocks of code that perform specific tasks. They allow programmers to modularize their code and improve readability. e. Objects and Classes: Object-oriented programming (OOP) is a programming paradigm that organizes code into objects, which encapsulate data and behavior. Classes define the blueprint for creating objects.

Programming Logic

a.Algorithms: Algorithms are step-by-step procedures for solving problems. They outline the logical flow of a program and the sequence of operations required to achieve a specific outcome. b. Problem-Solving: Effective programming involves breaking down complex problems into smaller, more manageable tasks and designing algorithms to solve them. c. Debugging: Debugging is the process of identifying and fixing errors, or bugs, in a program. Debugging skills are crucial for troubleshooting and ensuring the program functions as intended.

Resources for Learning Programming:

a. OnlineTutorials: Websites like Codecademy, Udemy, and Coursera offer interactive programming tutorials and courses for beginners. b. Programming Books: Books such as “Python Crash Course” by Eric Matthes and “JavaScript: The Good Parts” by Douglas Crockford provide comprehensive introductions to programming languages and concepts. c. Online Documentation: Programming languages often have official documentation that covers syntax, libraries, and usage. Examples include the Python Documentation and the Mozilla Developer Network (MDN) for JavaScript. d. Coding Challenges: Platforms like LeetCode and HackerRank provide coding challenges to practice and improve programming skills. e. Online Communities: Joining programming communities and forums, such as Stack Overflow or Reddit’s programming subreddits, allows you to connect with experienced programmers, ask questions, and learn from others.
Here are some additional resources for further information on understanding computer programming basics:

How to use system restore to fix common computer problems

System Restore to fix common computer problems

As computer users, we may encounter various issues that affect our system’s stability and performance. Fortunately, Windows provides a built-in feature called System Restore that can help resolve many common computer problems. System Restore allows you to roll back your computer’s settings to a previous state, undoing recent changes that may have caused issues. In this blog, we will explore how to use System Restore effectively to troubleshoot and fix common computer problems.

Before proceeding with System Restore, it’s important to note that it does not affect your personal files but may uninstall recently installed programs or updates. Additionally, System Restore is available only on Windows operating systems.

Here’s a step-by-step guide on using System Restore to fix common computer problems:

open System Restore

  • Click on the Start menu, search for “System Restore,” and select “Create a restore point” from the results.
  • In the System Properties window, click on the “System Protection” tab.
  • Click on the “System Restore” button to launch the System Restore wizard.

Choose a Restore Point

  • In the System Restore wizard, you’ll see a list of available restore points based on previous system changes and created restore points. Choose a restore point that precedes the occurrence of the computer problem you want to fix.
  • You can click on the “Scan for affected programs” button to see a list of programs that will be affected by the restore point you select. This can help you assess the potential impact of the restoration on your system.

Start the Restoration Process

  • Once you’ve selected a restore point, click on the “Next” button to proceed.
  • Review the restore point details and confirm your selection.
  • Click on the “Finish” button to start the restoration process. Your computer will restart, and the restoration will begin.

Wait for the Restoration to Complete

  • The restoration process may take some time, depending on your system’s configuration and the chosen restore point. Your computer will restart multiple times during the process.
  • It’s important not to interrupt the restoration process or turn off your computer to avoid potential data corruption

Verify the Results

  • After the restoration process is complete, your computer will boot up to the restored state.
  • Check if the common computer problem you were experiencing has been resolved.
  • It’s recommended to test your system thoroughly to ensure stability and functionality

Wait for the Restoration to Complete

  • The restoration process may take some time, depending on your system’s configuration and the chosen restore point. Your computer will restart multiple times during the process.
  • It’s important not to interrupt the restoration process or turn off your computer to avoid potential data corruption
Here are some additional resources for further information on using System Restore:

The benefits of using a firewall for your computer

benefits of using a firewall for your computer

In today’s interconnected world, where we rely heavily on the internet for various activities, ensuring the security of our computer systems is of paramount importance. One essential tool for safeguarding your computer is a firewall. A firewall acts as a barrier between your computer and potential threats, providing an additional layer of protection. In this blog, we will explore the benefits of using a firewall and why it is a crucial component of a robust cybersecurity strategy.

protection Against Unauthorized Access

A firewall serves as a virtual gatekeeper, monitoring incoming and outgoing network traffic. It acts as a filter, allowing authorized connections while blocking unauthorized attempts to access your computer or network. By enforcing access control, firewalls significantly reduce the risk of malicious actors gaining unauthorized access to your sensitive data.

Network Security

Firewalls play a vital role in securing your network infrastructure. They examine network packets and determine whether they meet predefined security rules. This helps prevent external threats from infiltrating your network, such as hackers attempting to exploit vulnerabilities or launch attacks. With a firewall in place, you can establish a secure perimeter for your network, reducing the likelihood of unauthorized access and potential data breaches.

application Security

Firewalls not only protect your network but also provide application-level security. They can monitor and control traffic based on specific applications or protocols. This allows you to define rules and restrictions for different types of applications, ensuring that only legitimate and trusted applications can communicate with your computer. By blocking unauthorized applications, firewalls help prevent malware and other malicious software from gaining access to your system.

intrusion Detection and Prevention

Many firewalls include intrusion detection and prevention capabilities. They can identify suspicious network activities or patterns that may indicate an ongoing attack. By monitoring network traffic and comparing it against known attack signatures, firewalls can detect and block potential threats in real-time, providing an additional layer of defense against intrusions and unauthorized access attempts.

Enhanced Privacy

Firewalls help protect your privacy by controlling the flow of information to and from your computer. They can prevent unauthorized data exfiltration and block applications from sending out sensitive information without your knowledge. This is particularly important when connected to public networks or when using applications that may transmit data without your explicit consent.

Customizable Security Policies

Firewalls offer customizable security policies, allowing you to define specific rules and configurations based on your unique requirements. You can tailor the firewall settings to meet your specific needs, such as allowing or blocking certain ports, protocols, or IP addresses. This flexibility empowers you to have granular control over the network traffic that is allowed or denied, ensuring a more secure computing environment.
Here are some additional resources for further information on using firewalls for computer security:

How to avoid common computer scams and phishings

In today’s digital age, computer scams and phishing attempts have become increasingly prevalent. Cybercriminals employ various techniques to deceive unsuspecting users and gain access to their sensitive information. To protect yourself and your personal data, it’s crucial to be aware of these scams and learn how to avoid falling victim to them. In this blog, we will explore some common computer scams and phishing attempts, along with practical tips to help you stay safe online.

Recognize Phishing Emails

Phishing emails are designed to trick you into revealing personal information or clicking on malicious links. Be cautious of emails that request sensitive information, come from unknown senders, have poor grammar or spelling, or convey a sense of urgency. Avoid clicking on suspicious links and never provide personal details unless you are certain of the email’s legitimacy.
When entering sensitive information, such as passwords or credit card details, ensure that the website is secure. Look for “https://” in the URL, indicating a secure connection, and a padlock icon in the address bar. Avoid entering sensitive information on websites that don’t have proper security measures in place.

Be Wary of Tech Support Scams

Tech support scams involve imposters posing as technical support representatives. They may contact you via phone, email, or pop-up messages, claiming that your computer has a problem and offering assistance. Legitimate tech support companies do not initiate contact in this manner. Avoid providing remote access to your computer or sharing personal information with unsolicited callers or emails.

Use Reliable Security Software

Install reputable antivirus and anti-malware software on your computer to detect and prevent threats. Keep the software up to date to ensure maximum protection against the latest scams and malware. Regularly scan your computer for potential threats and remove any identified risks promptly.

Strengthen Your Passwords

Create strong, unique passwords for your online accounts and avoid using the same password across multiple platforms. Use a combination. of uppercase and lowercase letters, numbers, and special characters. Consider using a password manager to securely store and manage your passwords

Stay Informed

Keep yourself updated about the latest computer scams and phishing techniques. Stay informed through reliable sources such as technology news websites, security blogs, and official announcements from reputable organizations. Being aware of new threats and evolving scams helps you stay one step ahead and make informed decisions when encountering suspicious activities.

Exercise Caution on Social Media

Be mindful of the information you share on social media platforms. Avoid posting sensitive details, such as your full address, phone number, or birthdate, as this information can be exploited by scammers. Adjust your privacy settings to limit the visibility of your personal information.
Here are some additional resources for further information on avoiding computer scams and phishing attempts:

Tips for extending the lifespan of your computer

A computer is a valuable and essential tool in today’s digital age. To maximize its lifespan and ensure optimal performance, it’s important to take proactive steps in maintaining and caring for your computer. By following some simple tips, you can extend the lifespan of your computer and enjoy its benefits for years to come. In this blog, we will explore several strategies and practices to help you prolong the life of your computer.

Keep Your Computer Clean

Regularly cleaning your computer helps prevent dust and debris buildup, which can impact its performance and lead to overheating. Use compressed air to clean the keyboard, vents, and other hard-to-reach areas. Wipe the screen with a microfiber cloth and use appropriate cleaning solutions for other surfaces. Keeping your computer clean not only improves its longevity but also enhances its overall appearance.
Regularly update your operating system, drivers, and applications to ensure they are running on the latest versions. Software updates often include bug fixes, security patches, and performance improvements. By keeping your software up to date, you minimize the risk of vulnerabilities and compatibility issues, thus extending the lifespan of your computer.

Practice Safe Internet Usage

Protecting your computer from malware and other online threats is crucial for its longevity. Install reputable antivirus software and keep it updated to defend against viruses, spyware, and other malicious software. Avoid downloading files from untrusted sources and be cautious when clicking on links or opening email attachments. Practicing safe internet usage reduces the risk of infections and potential damage to your computer.

Use Surge Protectors

Power surges and electrical fluctuations can damage your computer’s components. To safeguard your system, use surge protectors or uninterruptible power supplies (UPS) to regulate and stabilize the electrical flow. Surge protectors help prevent sudden power surges from reaching your computer and provide an extra layer of protection.

Maintain Proper Ventilation

Overheating is a common cause of computer hardware failures. Ensure that your computer has proper ventilation by keeping vents and fans clean and unobstructed. Place your computer in a well-ventilated area, away from direct sunlight and heat sources. Consider using a laptop cooling pad or an external fan for additional cooling, especially during intensive tasks.

Practice Proper Shut Down and Start-Up Procedures

Avoid abruptly shutting down or restarting your computer, as it can lead to data corruption or hardware damage. Instead, use the proper shutdown or restart options provided by your operating system. This allows the computer to close running processes and ensure a safe shutdown. Similarly, when starting up, allow the computer to fully boot before initiating any tasks.

Backup Your Data Regularly

Data loss can occur due to various reasons, including hardware failure, malware, or accidental deletion. To protect your important files and documents, regularly back up your data to an external storage device or cloud-based backup service. This ensures that even if your computer experiences a failure, your valuable data remains safe and accessible.

The advantages of using a wireless network in your home or office

Explore the advantages of wireless networks in our modern, tech-driven world. Discover why Wi-Fi networks have become the preferred choice for home and office connectivity.
wireless network

Convenience and Mobility

Enjoy the convenience and mobility that wireless networks provide. With no cables to tie you down, you can move freely while staying connected to the internet and your devices.
Set up your wireless network with ease and scale it effortlessly as your needs grow. Wireless networks offer straightforward installation and the flexibility to expand your network without the hassle of running additional cables.

Increased Productivity

Wireless networks boost productivity with device connectivity across spaces. In offices, employees collaborate freely, enhancing efficiency. At home, multiple devices connect, enabling shared internet access and resource sharing without constraints.

Enhanced Internet Access

Wireless networks boost productivity with device connectivity across spaces. In offices, employees collaborate freely, enhancing efficiency. At home, multiple devices connect, enabling shared internet access and resource sharing without constraints.

Device Mobility and Roaming

Wireless networks offer device mobility within coverage, vital in larger spaces. Roaming enables seamless transitions between access points, ensuring uninterrupted connectivity.

Flexibility in Network Layout

Wireless networks offer flexibility in device placement, allowing adjustments for optimal signal strength and coverage. Unlike wired networks limited by Ethernet ports, you can freely reposition access points for a robust and reliable wireless connection.

Cost-Effective Solution

Wireless networks are a cost-effective alternative to wired connections. They have lower initial setup costs and eliminate ongoing expenses for cable maintenance. Plus, they offer the flexibility to expand or reconfigure without the need for costly rewiring.

Conclusion

By utilizing a wireless network in your home or office, you can enjoy the convenience, flexibility, and mobility that it offers. Whether it’s for work, entertainment, or everyday tasks, a wireless network provides seamless connectivity and enhances your overall digital experience.

How to clean your computer’s keyboard and mouse

Keeping your computer’s keyboard and mouse clean is essential for maintaining their performance and longevity. Over time, dirt, dust, and debris can accumulate on these input devices, leading to sticky keys, unresponsive buttons, and overall poor functionality. Regular cleaning not only improves their appearance but also ensures optimal functionality. In this blog, we will explore the step-by-step process of cleaning your computer’s keyboard and mouse.

Before you begin cleaning your keyboard, gather the following tools:

  • Isopropyl alcohol or keyboard cleaning solution
  • Cotton swabs or soft microfiber cloth
  • Compressed air canister
  • Small brush (such as a clean, dry toothbrush)
To prevent accidental key presses or damage, power off your computer and disconnect the keyboard from the USB port or wireless receiver.
Hold the keyboard upside down and gently shake it to dislodge any loose debris, crumbs, or dust that may have accumulated between the keys.
With the help of a compressed air canister, blow air between the keys to remove finer particles and dust. Ensure you hold the canister upright and use short bursts of air to avoid damaging the keyboard’s internal components.
Use a clean, dry toothbrush or a soft brush to gently scrub the keyboard base, including the areas between the keys. This will help remove any remaining dirt or dust.
Dampen a cotton swab or soft microfiber cloth with isopropyl alcohol or a specialized keyboard cleaning solution. Gently rub the keys and surrounding areas to remove grime, fingerprints, and stains. For stubborn residue, you can use a small amount of mild soap diluted in water.
Allow the keyboard to air dry completely before reconnecting it to your computer. Ensure there is no moisture left to prevent damage.

Before you begin cleaning your mouse, gather the following tools:

  • Isopropyl alcohol or electronic-safe cleaning solution
  • Cotton swabs or soft microfiber cloth
  • Compressed air canister
  • Small brush (such as a clean, dry toothbrush)
Turn off your computer and disconnect the mouse from the USB port or wireless receiver.
Dampen a soft microfiber cloth or cotton swab with isopropyl alcohol or an electronic-safe cleaning solution. Gently wipe the exterior surfaces of the mouse, including the buttons and scroll wheel, to remove dirt, fingerprints, and smudges.
Inspect the sensor area located on the bottom of the mouse. Use a cotton swab lightly moistened with isopropyl alcohol to clean the sensor lens and remove any dust or debris that may affect its tracking performance.
Ensure the mouse is completely dry before reconnecting it to your computer or turning it back on.
With the help of a compressed air canister, blow air around the buttons and crevices to dislodge any loose particles. This will help remove debris that may affect the mouse’s functionality.

Here are some helpful links for further information on cleaning computer keyboards and mice

By regularly cleaning your computer’s keyboard and mouse using the correct techniques, you can ensure their longevity and optimal performance.

HP 14m-dy1033dx

Pre-Installed Software

Dell Optiplex 7040 Gaming PC

Preloaded Software

Donar Information

Apple A1398 MacBook Pro 15" 2015

Preload Software

Apple A1398 MacBook Pro 15" 2014

Preload Software

Late 2012 Mac mini

Preload Software

Apple MacBook Pro 13" Late 2014

Extension Cord

Preload Software

Late 2014 Mac mini

Preload Software

Book An Engineer Now

2012 MacBook Pro 13

Preloaded Software

Late 2015 iMac 4k Retina

Preloaded Software

Brand New 60W MagSafe1 Adapter For MacBook Pro Power Charger A1184 A1330 A1344

Neutral box

Compatible model

Compatible Product Line

7 in 1 Multiport USB C Adapter

Product Features

Product Specification

Genuine OEM 85W MagSafe 2 Power Adapter With 6Ft Extension Cord For Apple MacBook Pro Retina

Technical Specification

Compatible Models

Apple 61W USB-C Power Adapter with 1M USB-C to C Cable + Extension Cord

Mac Models

BUNDLE

Targus Universal Laptop Charger APA110US (New)

FEATURES

The 90W AC Semi-Slim Universal Laptop Charger is ideal for those who need a second adapter for travel, or a replacement adapter for their current laptop. The charger is slimmer than a standard laptop adapter so it easily fits in your briefcase or backpack. Built-in power supply protection ensures safe use with over voltage, over current, and over temperature protection to keep all of your mobile devices safe from unexpected surges and spikes.
It also features an interchangeable tip system, which is convenient for those who own multiple laptops as it provides compatibility across major laptop brands. The Targus 90W Semi-Slim Universal Laptop Charger is designed to support Acer®, ASUS®, Compaq®, Dell®, Fujitsu®, Gateway®, HP®, IBM®, Lenovo®, and Toshiba® laptops right out of the box.
Specifications
• Works With
Laptops from Acer, Asus, Dell, HP, Lenovo, Toshiba
• Color
Black
• Adapter Type
Wall Charger
• Current Type
AC
• Wattage
90W
• Dimensions
4.80" x 2.17" x 0.83" (W x H x D)
• WeightIt also features an interchangeable tip system, which is convenient for those who own multiple laptops as it provides compatibility across major laptop brands. The Targus 90W Semi-Slim Universal Laptop Charger is designed to support Acer®, ASUS®, Compaq®, Dell®, Fujitsu®, Gateway®, HP®, IBM®, Lenovo®, and Toshiba® laptops right out of the box.