1047 Glenbrook Way Suite 112 Hendersonville, TN 37075

service@geekzuprepairs.com

The benefits of using a ups for your computer

benefits of using a ups for your computer

Using an Uninterruptible Power Supply (UPS) for your computer offers several benefits that help protect your system and data. Here are some of the key advantages:

Power Backup during Outages

  • One of the primary benefits of a UPS is its ability to provide backup power during electrical outages.

  • A UPS contains a built-in battery that automatically kicks in when it detects a loss of power, allowing your computer to stay operational.

  • This backup power gives you time to save your work, shut down your computer properly, and prevent data loss or damage caused by sudden power loss.

Protection against Power Fluctuations

  • Power fluctuations, such as voltage surges, spikes, or sags, can damage computer components.

  • A UPS acts as a buffer between your computer and the power source, regulating and conditioning the incoming electrical supply.

  • It helps protect your computer from sudden voltage changes, ensuring a stable and consistent power flow.

Safeguarding Against Power Surges

  • Power surges, caused by lightning strikes, faulty wiring, or grid fluctuations, can pose a significant risk to your computer.

  • A UPS includes surge protection features that help absorb and dissipate excessive voltage spikes, safeguarding your computer and connected devices.

  • By preventing power surges from reaching your computer, a UPS helps extend the lifespan of your hardware and protects against potential damage.

Preventing Data Loss and Corruption

  • Sudden power interruptions or voltage fluctuations can lead to data loss or corruption, especially if your computer is in the middle of writing or reading data.

  • With a UPS, you have the opportunity to save your work and properly shut down your computer during power outages, minimizing the risk of data loss or file system errors.

Enhancing Equipment Longevity

  • By providing clean and stable power, a UPS helps extend the lifespan of your computer equipment.

  • Power fluctuations and abrupt shutdowns can strain components, leading to premature hardware failure.

  • The consistent power supply from a UPS reduces wear and tear on sensitive components like the motherboard, hard drive, and power supply.

Avoiding Downtime and Productivity Loss

  • Power outages and unexpected shutdowns can disrupt your work or productivity.

  • By using a UPS, you can continue working uninterrupted during short power outages or safely shut down your system in case of prolonged outages.

  • This helps avoid data loss, downtime, and the need to restart tasks or recover unsaved work.

Additional Protection for Connected Devices

  • Besides your computer, a UPS can protect other essential devices connected to it, such as monitors, external hard drives, network equipment, or peripherals.

  • By providing surge protection and backup power to these devices, a UPS ensures their safety and helps maintain network connectivity during power disturbances

conclusion

When selecting a UPS, consider factors such as power capacity, battery runtime, number of outlets, and additional features like automatic voltage regulation (AVR) or data line protection. Assess your computer’s power requirements and choose a UPS that can adequately support your equipment. Overall, investing in a UPS provides reliable power backup, surge protection, and safeguards your computer and data against power-related issues. It offers peace of mind, increased productivity, and helps protect your valuable hardware investment.

How to avoid common computer hardware failures

common computer hardware failures

Avoiding common computer hardware failures is crucial for maintaining the longevity and reliability of your system. Here are some tips to help you prevent hardware failures:

Keep Your Computer Clean

  • Regularly clean the internal components of your computer to prevent dust buildup. Dust can clog fans, vents, and heat sinks, leading to overheating and potential hardware failures.

  • Use compressed air to blow out dust from the computer case, fans, and other components.

  • Avoid eating or drinking near your computer to prevent accidental spills that can damage sensitive hardware.

Ensure Proper Ventilation and Cooling

  • Ensure that your computer has adequate airflow and ventilation.

  • Keep your computer in a well-ventilated area, away from obstructions that may block airflow.

  • Monitor the temperature of your computer components using software utilities and take appropriate action if temperatures are too high.

  • Consider using additional cooling solutions, such as case fans or liquid cooling, if you have high-performance components or live in a hot climate.

Use a High-Quality Power Supply

  • Invest in a high-quality power supply unit (PSU) that provides stable and reliable power to your computer components.

  • Avoid cheap or low-quality power supplies, as they may deliver inconsistent power, resulting in hardware instability or failure.

  • Ensure that the power supply has sufficient wattage to meet the requirements of your computer components.

Protect Against Power Surges

  • Use a surge protector or uninterruptible power supply (UPS) to safeguard your computer from sudden voltage spikes or power outages.

  • Power surges can damage sensitive hardware components, including the motherboard, CPU, or storage devices.

  • Avoid cheap or low-quality power supplies, as they may deliver inconsistent power, resulting in hardware instability or failure.

  • Ensure that the power supply has sufficient wattage to meet the requirements of your computer components.

Handle Components with Care

  • When installing or removing hardware components, handle them carefully and avoid applying excessive force.

  • Follow proper installation procedures and consult component manuals or online resources for guidance.

  • Avoid static discharge by using an antistatic wrist strap or frequently grounding yourself when working with computer hardware.

Update Drivers and Firmware

  • Keep your hardware drivers and firmware up to date. Manufacturers release updates that address bugs, improve compatibility, and enhance performance.

  • Check the manufacturer’s website or use automatic driver update software to ensure you have the latest versions installed.

Perform Regular Maintenance and Backups

  • Regularly perform maintenance tasks such as disk cleanup, disk defragmentation, and system optimization to keep your computer running smoothly.

  • Back up your important data regularly to an external storage device or cloud service to protect against hardware failures or data loss.

Monitor Hardware Health

  • Use hardware monitoring software to keep an eye on the health of your computer components.

  • Monitor temperatures, fan speeds, and other vital statistics to identify potential hardware issues early on.

Conclusion:

By following these tips, you can reduce the risk of common hardware failures and extend the lifespan of your computer components. Remember to perform regular maintenance, keep your system clean and cool, and use high-quality components for optimal performance and reliability.

Understanding the different types of computer memory: DDR, DDR2, DDR3, DDR4

different types of computer memory

Understanding the different types of computer memory is essential when it comes to building or upgrading a computer system. The primary types of computer memory you’ll encounter are DDR (Double Data Rate), DDR2, DDR3, and DDR4. Let’s explore each type in detail:

DDR (Double Data Rate)

  •  DDR memory was the first generation of the DDR technology and is now outdated.

    • It operates at a lower speed compared to the subsequent generations.

    • DDR memory modules have 184 pins (for desktops) or 200 pins (for laptops).

    • The data transfer rate of DDR memory is typically expressed as DDR-200, DDR-266, DDR-333, or DDR-400, representing the maximum megabytes per second (MB/s) it can transfer.

DDR2 (Double Data Rate 2)

  • DDR2 memory is the second generation of DDR technology and offers improved performance over DDR.

  • It operates at higher clock speeds and has higher memory bandwidth.

  • DDR2 memory modules have 240 pins (for both desktops and laptops).

  • The data transfer rate of DDR2 memory is denoted as DDR2-533, DDR2-667, DDR2-800, etc.

DDR3 (Double Data Rate 3)

  • DDR3 memory is the third generation of DDR technology and provides further advancements in speed and efficiency.

  • It operates at even higher clock speeds and has increased memory bandwidth compared to DDR2.

  • DDR3 memory modules have 240 pins (for both desktops and laptops).

  • The data transfer rate of DDR3 memory is represented as DDR3-1066, DDR3-1333, DDR3-1600, etc.

DDR4 (Double Data Rate 4)

  • DDR4 memory is the latest generation of DDR technology and offers significant improvements in performance and power efficiency.

  • It operates at higher clock speeds and provides increased memory density.

  • DDR4 memory modules have 288 pins (for both desktops and laptops).

  • The data transfer rate of DDR4 memory is denoted as DDR4-2133, DDR4-2400, DDR4-2666, etc.

It’s important to note that each generation of memory is not backward compatible with the previous ones. For example, DDR4 memory modules cannot be used in systems designed for DDR3 or DDR2 memory.

When choosing memory for your computer system, consider the motherboard’s supported memory type. Check the motherboard’s specifications or user manual to ensure compatibility with the desired memory type.

Conclusion:

By understanding the different types of computer memory and their respective generations, you can make informed decisions when upgrading or building a computer system, ensuring optimal performance and compatibility.

The importance of using a reputable antivirus software

importance of using a reputable antivirus software

Using a reputable antivirus software is crucial for ensuring the security and protection of your computer and personal data. In today’s digital landscape, where cyber threats are prevalent, having reliable antivirus software is essential. Let’s explore the importance of using a reputable antivirus software:

Protection against Malware

Antivirus software serves as a defense mechanism against various forms of malware, including viruses, worms, Trojans, ransomware, spyware, and adware. These malicious programs can compromise your system’s security, steal sensitive information, or cause damage to your files. A reputable antivirus software actively scans and detects malware, preventing it from infecting your computer.

Real-time Threat Detection

A reliable antivirus program provides real-time monitoring, constantly scanning your system for any suspicious activity or potential threats. It can detect and block malware before it has a chance to execute and cause harm. This proactive approach helps protect your computer from both known and emerging threats.

Regular Updates and Database

Reputable antivirus software companies continuously update their software and maintain extensive databases of known malware signatures. These updates ensure that your antivirus program is equipped to detect and defend against the latest threats. Regular updates also include bug fixes and improvements to enhance the software’s performance and effectiveness.

Web Browsing Protection

Many antivirus solutions include web protection features that help safeguard your online activities. These features can detect and block malicious websites, phishing attempts, and other online threats. They provide a secure browsing environment, protecting you from inadvertently visiting harmful sites or falling victim to online scams.

Email Security

Email is a common vector for malware distribution and phishing attacks. Reputable antivirus software often includes email scanning capabilities to detect and filter out malicious attachments, links, or suspicious content. This helps prevent malware-infected emails from reaching your inbox and keeps your email communications secure.

System Performance Optimization

In addition to malware protection, antivirus software can optimize your computer’s performance. It scans for unnecessary files, temporary files, and other system junk that can slow down your computer. By removing these items, antivirus software helps free up storage space, improve system responsiveness, and enhance overall performance.

Firewall and Network Protection

Many reputable antivirus solutions include built-in firewalls and network protection features. These components monitor incoming and outgoing network traffic, protecting your computer from unauthorized access, network attacks, and intrusion attempts. They help create a secure barrier between your computer and the external network.
Remember, it is important to choose a reputable antivirus software from a trusted vendor. Here are a few examples of well-known antivirus software providers:
By using reputable antivirus software, you can significantly reduce the risk of malware infections, protect your personal data, and maintain the security and integrity of your computer system.

Conclusion:

Always ensure that your antivirus software is up to date and perform regular system scans for comprehensive protection against malware and other security threats.

How to clean your computer’s registry for better performance

clean your computer's registry for better performance

Cleaning your computer’s registry can help optimize its performance by removing unnecessary or invalid entries that accumulate over time. Here are the steps to clean your computer’s registry for better performance:

Back Up Your Registry

Before making any changes to the registry, it’s essential to create a backup in case something goes wrong. To do this, follow these steps:

  • Press the Windows key + R to open the Run dialog box.
  • Type “regedit” and press Enter to open the Registry Editor.
  • In the Registry Editor, click on “File” in the menu bar and select “Export.”
  • Choose a location to save the backup file, provide a name, and click “Save.”

Use a Reliable Registry Cleaner

There are several reputable registry cleaner tools available that can automate the process of scanning and cleaning your computer’s registry. These tools can help identify and remove invalid entries, broken links, and other registry issues. Here are a few popular registry cleaner tools.

Download and Install a Registry Cleaner

  • Visit the website of the registry cleaner you have chosen.
  • Download the installer file.
  • Run the installer and follow the on-screen instructions to install the software on your computer.
  1.  

Run the Registry Cleaner

  • Open the installed registry cleaner tool.
  • Follow the instructions provided by the tool to perform a scan of your computer’s registry.
  • Once the scan is complete, review the scan results to identify the issues found

Review and Confirm Changes

  • Before proceeding with the cleaning process, carefully review the changes suggested by the registry cleaner tool.
  • Ensure that you understand the changes being made and that they are safe to apply.

Perform the Registry Cleanup

  • Once you are confident with the changes, initiate the registry cleaning process as recommended by the tool.
  • The tool will remove invalid or unnecessary entries from the registry.

Restart Your Computer

  • After the cleaning process is complete, restart your computer to allow the changes to take effect.
Remember, cleaning the registry is an advanced task that should be performed with caution. It’s recommended to create a backup and use reputable registry cleaner tools to minimize the risk of any unwanted changes or system instability.
Cleaning your computer’s registry can help optimize performance, but it’s important to understand the risks and limitations associated with this process.

The benefits of using an external hard drive for backup and storage

benefits of using an external hard drive for backup and storage

Explore the advantages of utilizing an external hard drive for backup and storage, and discover how this solution can enhance data security, organization, and storage capacity.
hard drive for backup and storage

Enhanced Data Security

Learn how external hard drives provide an additional layer of data security, safeguarding your important files from loss or damage.

Expanded Storage Capacity

Explore how external hard drives can significantly increase your available storage space, making it easy to manage large files and multimedia.

Improved File Organization

Discover how external hard drives help in better file organization, enabling efficient data management and easy access to your stored content.

Accessibility and Portability

Understand the convenience of external hard drives, which are portable and provide easy access to your data wherever you go.

Data Redundancy

Learn how external hard drives offer data redundancy, ensuring your information is safe and easily recoverable in case of system failures.

Versatile Backup Solutions

Explore the various backup solutions and methods that external hard drives can offer for different needs and preferences.

Cost-Effective Storage

Understand how external hard drives provide cost-effective storage solutions, especially for those with growing data needs.

Versatile Backup Solutions

Explore the various backup solutions and methods that external hard drives can offer for different needs and preferences.
Here are some additional resources with further information on the benefits of using an external hard drive for backup and storage:

Conclusion:

In conclusion, utilizing an external hard drive for backup and storage offers advantages such as data redundancy, expanded storage capacity, and improved file organization. Whether you need to safeguard important files or create additional space on your computer, an external hard drive

Tips for creating a secure and encrypted Wi-Fi network

creating a secure and encrypted Wi-Fi network

Creating a secure and encrypted Wi-Fi network is essential to protect your personal information, prevent unauthorized access, and ensure the privacy and security of your internet connection. Here are some tips to help you create a secure and encrypted Wi-Fi network:

Change the Default Network Name (SSID)

The SSID is the name of your Wi-Fi network that is broadcasted to nearby devices. Change the default SSID to something unique that doesn’t reveal personal information or the router model. Avoid using easily identifiable names like your address or personal name.

Set a Strong and Unique Wi-Fi Password

Create a strong Wi-Fi password that is at least 12 characters long and includes a combination of upper and lower case letters, numbers, and special characters. Avoid using common phrases or easily guessable information. Additionally, make sure to use a unique password that is not used for any other accounts or services.

Enable WPA2 or WPA3 Encryption

Use the latest encryption protocols available, such as WPA2 (Wi-Fi Protected Access II) or WPA3, to encrypt the data transmitted over your Wi-Fi network. Encryption scrambles the data, making it unreadable to unauthorized users. Avoid using outdated encryption protocols like WEP (Wired Equivalent Privacy), as they are more vulnerable to attacks.

Disable Remote Management

Disable remote management of your Wi-Fi router to prevent unauthorized access. Remote management allows you to access and configure your router settings from outside your home network, but it can also be exploited by attackers. It’s safer to access your router settings locally through a wired connection.

Enable Network Firewall

Enable the built-in firewall feature on your Wi-Fi router to add an extra layer of protection. A firewall helps monitor and filter incoming and outgoing network traffic, blocking unauthorized access and potential threats.

Disable WPS (Wi-Fi Protected Setup)

WPS is a convenient feature that allows devices to quickly connect to your Wi-Fi network. However, it can be vulnerable to brute-force attacks. Disable WPS on your router to enhance security.

Regularly Update Router Firmware

Keep your router firmware up to date by regularly checking for updates from the manufacturer. Firmware updates often include security patches and bug fixes that help protect against known vulnerabilities.

Disable Guest Network if Not in Use

If you don’t require a guest network, it’s recommended to disable this feature on your Wi-Fi router. Guest networks can be a potential entry point for attackers if not properly secured.

Position Your Router Strategically

Place your router in a central location in your home or office to ensure Wi-Fi coverage across all desired areas. Avoid positioning it near windows or external walls where the signal can be easily intercepted from outside.

Regularly Monitor Connected Devices

Regularly review the list of devices connected to your Wi-Fi network. Ensure that all the connected devices are authorized and recognize each one. If you notice any unfamiliar devices, investigate and take appropriate actions, such as changing the Wi-Fi password or blocking the device.
Here are some additional resources with further tips and information on securing and encrypting Wi-Fi networks:

Conclusion:

By implementing these tips, you can significantly enhance the security and privacy of your Wi-Fi network, ensuring a safe and encrypted connection for you and your authorized devices.

Understanding the differences between RAM and ROM

Differnces between ram and rom

RAM (Random Access Memory) and ROM (Read-Only Memory) are two essential types of computer memory with distinct characteristics and purposes. Understanding the differences between them is crucial in comprehending how computers store and access data. In this blog, we’ll explore the definitions, functions, and dissimilarities between RAM and ROM.

RAM

RAM, also known as Random Access Memory, is a type of volatile memory that stores data temporarily while your computer is running. It provides quick and temporary storage for data that the CPU (Central Processing Unit) needs to access rapidly. Here are the key features of RAM:

Volatile Memory

RAM is volatile, meaning it requires a constant power supply to retain data. Once the power is cut off or the computer is turned off, the data stored in RAM is lost.

Temporary Storage

RAM stores data that is actively used by the CPU. It holds instructions, applications, and data that are currently being processed, allowing for quick access and retrieval.

Fast Read and Write Speeds

RAM offers fast read and write speeds, enabling efficient data transfer between the CPU and memory. This quick access ensures smooth and responsive computing performance.

Dynamic Nature

RAM is dynamic, meaning it can be read from and written to. It allows for flexibility in storing and modifying data during the operation of a computer program.

ROM

ROM, or Read-Only Memory, is a non-volatile memory that contains permanent instructions or data that cannot be easily modified or erased. It retains information even when the computer is powered off. Here are the key features of ROM:

Non-volatile Memory

ROM is non-volatile, meaning it retains data even without a power supply. It stores permanent instructions or data that are required for the basic operation of the computer.

Pre-Programmed Content

ROM comes with pre-programmed content that is written during manufacturing. It contains firmware, such as the computer’s BIOS (Basic Input/Output System), which is essential for the booting process.

Read-Only Access

Unlike RAM, ROM is read-only, meaning it cannot be easily written to or modified by regular computer operations. Its content is “locked” and remains unchanged over time.

Firmware and System Initialization

ROM holds critical firmware and system initialization instructions that are necessary for the computer to start up and perform essential tasks.
To further explore the differences between RAM and ROM

Conclusion:

In conclusion, RAM and ROM are both important types of computer memory, but with distinct characteristics and functions. RAM provides temporary storage for data actively used by the computer, offering fast access and high-speed performance. On the other hand, ROM contains permanent instructions and data necessary for system initialization and cannot be easily modified. Understanding the differences between RAM and ROM is essential in comprehending the inner workings of computers and their memory systems.

The importance of using a surge protector for your computer

surge protector for your computer

When it comes to protecting your computer and other electronic devices, investing in a surge protector is essential. A surge protector is a device that safeguards your electronics against power surges, which can occur due to lightning strikes, power outages, or electrical fluctuations. In this blog, we’ll explore the importance of using a surge protector for your computer and the benefits it provides in terms of safety and equipment protection.

Protection Against Power Surges

Power surges can occur when there is a sudden increase in voltage in your electrical system. These surges can cause irreparable damage to your computer and other sensitive electronic devices. A surge protector acts as a barrier, absorbing excess voltage and diverting it away from your equipment. By using a surge protector, you can protect your computer from the harmful effects of power surges and ensure its longevity.

Safeguarding Against Lightning Strikes

Lightning strikes can send powerful electrical surges through power lines and cause significant damage to connected devices. Even if your computer is turned off during a storm, it can still be affected if lightning strikes nearby. By plugging your computer into a surge protector, you provide an additional layer of defense against lightning-induced power surges, minimizing the risk of damage to your valuable equipment.

Preventing Data Loss and Corruption

Power surges not only pose a risk to the physical components of your computer but also to your data. Sudden power interruptions or voltage fluctuations can result in data loss or corruption. By using a surge protector, you reduce the chances of unexpected power disruptions that can lead to data loss, protecting your important files, documents, and projects.

Extending Equipment Lifespan

Computers and other electronic devices are designed to operate within specific voltage ranges. Constant exposure to power surges or fluctuations can cause stress on the internal components, potentially shortening their lifespan. By using a surge protector, you create a stable and consistent power supply, reducing the wear and tear on your computer and extending its overall lifespan.

Convenient Outlet Expansion and Equipment Organization

Surge protectors often come with multiple outlets, allowing you to connect and protect multiple devices simultaneously. This feature not only provides protection but also offers convenient outlet expansion, ensuring that all your computer peripherals and other electronic devices are safely powered. Surge protectors also help in organizing and managing cables, reducing clutter and improving the overall aesthetics of your workspace.
To help you choose the right surge protector for your computer.

Conclusion:

In conclusion, using a surge protector for your computer is an essential step in protecting your equipment and data from the damaging effects of power surges. By investing in a surge protector, you provide a vital layer of defense against voltage fluctuations, power disruptions, and lightning strikes. Remember to choose a surge protector that suits your needs and provides sufficient outlets for your devices. Safeguard your computer and enjoy peace of mind knowing that your equipment is protected against unforeseen electrical hazards.

How to optimize your computer for gaming

optimize your computer for gaming

Gaming on a computer is a popular pastime for many, but to truly enjoy the immersive gaming experience, it’s essential to optimize your computer for maximum performance. From adjusting settings to upgrading hardware, there are several steps you can take to enhance your gaming experience and ensure smooth gameplay. In this blog, we’ll explore various tips and techniques to optimize your computer for gaming.

Update Your Graphics Drivers

One of the most crucial aspects of gaming performance is having up-to-date graphics drivers. Graphics drivers provide compatibility and performance improvements for your graphics card, enabling it to run games smoothly and efficiently. Visit the website of your graphics card manufacturer (such as NVIDIA or AMD) and download the latest drivers for your specific card model.

Adjust In-Game Graphics Settings

Most modern games offer a range of graphics settings that allow you to customize the visual quality and performance of the game. Adjusting these settings can significantly impact your gaming experience. Lowering certain options like anti-aliasing, shadow quality, and texture resolution can help improve frame rates and reduce lag. Experiment with different settings to find the right balance between visuals and performance.

Optimize Windows Settings

Tweaking certain Windows settings can also contribute to better gaming performance. Here are a few optimizations to consider:

Disable unnecessary background processes: Close any non-essential applications running in the background to free up system resources.

Adjust power settings: Set your power plan to “High Performance” to ensure your computer is running at its maximum potential.

Disable visual effects: Turn off unnecessary visual effects like animations and transparency to reduce system resource consumption.

Keep Your System Clean and Updated

Regularly clean your computer to remove dust and ensure optimal airflow. Overheating can lead to performance issues during gaming sessions. Additionally, keep your operating system and drivers up to date to benefit from performance optimizations and bug fixes.

Upgrade Hardware

If you’re looking to maximize gaming performance, upgrading certain hardware components may be necessary. Consider the following upgrades:

Graphics card: A powerful graphics card can significantly enhance gaming performance and allow you to play the latest titles at higher settings.

RAM: Sufficient RAM (memory) is crucial for smooth gameplay. Consider upgrading to a higher capacity if you experience frequent stuttering or lag.

Storage: An SSD (Solid State Drive) can reduce load times and improve overall system responsiveness.

Here are some additional resources to help you optimize your computer for gaming:

conclusion

By following these optimization tips and techniques, you can ensure a smoother and more enjoyable gaming experience on your computer. Remember to regularly update your drivers, adjust in-game settings, optimize Windows, keep your system clean and updated, and consider hardware upgrades as needed. Now, get ready to dive into the virtual worlds with enhanced gaming performance!

Disclaimer: Before making any changes to your computer’s settings or upgrading hardware, ensure you understand the process and potential risks involved. If you’re uncertain, consult with a professional or seek guidance from reliable sources.

HP 14m-dy1033dx

Pre-Installed Software

Dell Optiplex 7040 Gaming PC

Preloaded Software

Donar Information

Apple A1398 MacBook Pro 15" 2015

Preload Software

Apple A1398 MacBook Pro 15" 2014

Preload Software

Late 2012 Mac mini

Preload Software

Apple MacBook Pro 13" Late 2014

Extension Cord

Preload Software

Late 2014 Mac mini

Preload Software

Book An Engineer Now

2012 MacBook Pro 13

Preloaded Software

Late 2015 iMac 4k Retina

Preloaded Software

Brand New 60W MagSafe1 Adapter For MacBook Pro Power Charger A1184 A1330 A1344

Neutral box

Compatible model

Compatible Product Line

7 in 1 Multiport USB C Adapter

Product Features

Product Specification

Genuine OEM 85W MagSafe 2 Power Adapter With 6Ft Extension Cord For Apple MacBook Pro Retina

Technical Specification

Compatible Models

Apple 61W USB-C Power Adapter with 1M USB-C to C Cable + Extension Cord

Mac Models

BUNDLE

Targus Universal Laptop Charger APA110US (New)

FEATURES

The 90W AC Semi-Slim Universal Laptop Charger is ideal for those who need a second adapter for travel, or a replacement adapter for their current laptop. The charger is slimmer than a standard laptop adapter so it easily fits in your briefcase or backpack. Built-in power supply protection ensures safe use with over voltage, over current, and over temperature protection to keep all of your mobile devices safe from unexpected surges and spikes.
It also features an interchangeable tip system, which is convenient for those who own multiple laptops as it provides compatibility across major laptop brands. The Targus 90W Semi-Slim Universal Laptop Charger is designed to support Acer®, ASUS®, Compaq®, Dell®, Fujitsu®, Gateway®, HP®, IBM®, Lenovo®, and Toshiba® laptops right out of the box.
Specifications
• Works With
Laptops from Acer, Asus, Dell, HP, Lenovo, Toshiba
• Color
Black
• Adapter Type
Wall Charger
• Current Type
AC
• Wattage
90W
• Dimensions
4.80" x 2.17" x 0.83" (W x H x D)
• WeightIt also features an interchangeable tip system, which is convenient for those who own multiple laptops as it provides compatibility across major laptop brands. The Targus 90W Semi-Slim Universal Laptop Charger is designed to support Acer®, ASUS®, Compaq®, Dell®, Fujitsu®, Gateway®, HP®, IBM®, Lenovo®, and Toshiba® laptops right out of the box.