Proper use and maintenance of portable computer batteries

2011-03-28  来源:本站原创  分类:Industry  人气:53 

Proper use and maintenance of laptop batteries in 2006, the notebook computer industry is full of a keyword, is the battery. Dell laptop battery, but before, sporadic cell phone batteries, laptop battery news, more or less have the network and appeared in various media, but in the shelling, and a continuous fire, there is no doubt that these stars Wang sudden prevention of negative effects as well.

Despite that, Sony has given nearly half of annual profits, because they have detonated an explosion of full pay or laptop battery. But people still add a new understanding, laptop battery for: "dangerous goods. "You're next year's pig just the start, laptop and notebook battery recall Sanyo common people once again become the focus of attention on media and consumer focus, all use of laptop users leave the new battery Sanyo panic.

Why laptop battery will explode, we should be the proper use of laptop battery is based, such as how to avoid the explosion it? Let's look at what the laptop battery.

The internal structure of laptop battery

This is a piece of notebook computer batteries, it can be said is a very simple structure, the control circuit and a few pieces of lithium batteries. These looked like we usually use lithium AA batteries, of course, in fact they are not, its chemical composition and different sizes, gaps in the ability of its size. Although its appearance than our traditional AA batteries are not a small gap, but the nature of the study, is still a lithium-ion battery, first of all, we will look at the characteristics of lithium-ion battery, and noted.

Batteries and battery - 5 more normal

Lithium-ion battery (Li-ion has a high unit power and lighter weight, and the memory effect is far more popular before (Ni-MH Ni-MH battery is low, so far, it can be said is absolutely mainstream. 6 degrees Celsius following lithium-ion batteries can be self - 5% of the emissions, per month, the best preservation methods is to control 40% of the freezer, you can save nearly a decade.

Principles of lithium-ion battery

The lithium-ion battery life with different views, the depth charges before the cost of deep heat, is very familiar, many users do not use the battery to eliminate as many as possible. However, rechargeable lithium-ion battery cycle life and relationship is not great, it's life is in 12 - 18 months. However, we note in the lithium-ion batteries can not discharge any depth, it could cause the battery to completely scrapped. Similarly, 40% charge is frozen for about 3 months should be removed to avoid self - supply and emissions.

Lithium-ion battery diagram

In addition, lithium-ion battery is also very sensitive to temperature at high temperatures will shorten the life and the possibility of an explosion, but the temperature below 0 degrees or lower, it is likely to be a blow, or even end their lives. So as to lithium-ion batteries, high and low temperatures will bring no small issues, including impact on battery life, weight is likely to cause an explosion, a direct threat to the life of the user.

So how should use and maintenance, laptop computer batteries?

1, avoid the use of laptop batteries at high temperatures

As mentioned above, high temperatures, the laptop battery life will be seriously reduced, or even an explosion hazard, so we should avoid using the laptop battery under high temperature, the heat as much as possible to improve the environment for notebook computer, notebook computer can not only prolong life, because there is no help of a small laptop battery

2, try not to use the cost of fast

In fact, has formed a fast charging technology is an international company. The birth of this technology for business personnel, whose role is obvious, this kind of business people try to save valuable time. In fact, the basic principles of this technology, charging voltage and current increase will bring more heat, quickly reduce the battery life, and will increase the risk of battery explosion. A large number of international companies to protect technology, but since the attacks last year that several laptop battery is easy to see that these protective technology is not all-powerful, fast cost, or can be avoided.

相关文章
  • Proper use and maintenance of portable computer batteries 2011-03-28

    Proper use and maintenance of laptop batteries in 2006, the notebook computer industry is full of a keyword, is the battery. Dell laptop battery, but before, sporadic cell phone batteries, laptop battery news, more or less have the network and appear

  • HP re-issued the "recall order": 160,000 laptop batteries kept hidden 2011-05-30

    From the U.S. Consumer Product Safety Commission (CPSC) noted that, because of battery overheating and rupture of the problem, and consumers may lead to fire damage, HP once again to recall 160,000 notebook computer batteries. CPSC said that in May 2

  • WIA causes the computer to boot into the desktop computer starts very slowly for a long time before the desktop appears 2011-08-30

    XP computer starts normally, but the emergence of the desktop icons to the desktop appears to wait about three minutes, if such a situation, a problem estimated WIA. I often distressed to such problems, often blame the blame on the Rising, the result

  • Software development team 2009-11-11

    Will bring together a group of people, this is the beginning. Let a group of people to be together, this is progress. A group of people to work together so that it was successful. -Lou Holtz, American football coach As early as in the lives of the Gr

  • Seven misconceptions of network security 2011-07-20

    In the border a firewall, installed on the desktop anti-virus and anti-spyware tools, the use of encryption technology to send and store data; In addition, Microsoft and major security companies continue to enhance security tools and patches ... ...

  • linux boot service Xiangjie 2010-04-12

    acpid Configuration files: / proc / acpi / event The default port: None Description: Advanced Configuration and Power Interface, as an alternative to traditional APM power management standards and introduced new power management standard. Need to sta

  • Cooks and waiters can not fight for a job: the interface. Logic. Data that thing (in) 2010-05-27

    In the previous article, I have war of words triggered by the July 15 to do two articles cited, that is how can the application layer and the occurrence of competing data storage. In this, I will talk about is how the application layer and the occurr

  • Cooks and waiters can not fight for a job: interface. Logic. Data that thing (the) 2010-05-27

    In the previous article, I have war of words triggered by the July 15 to do two articles cited, that is how can the application layer and the occurrence of competing data storage. In this, I will talk about is how the application layer and the occurr

  • MRR-220 Akira electrical 2010-07-23

    MRR in the "Dazzling" after as long as the "Dazzling" duration of no more than set the "Dazzling" to allow time for Tm (0.1 ~ 25s), both by setting Time Td (0 ~ 25s) and then start by "Akira" stop the motor, such as

  • MRR-220 stock Canada vpt 2010-07-29

    Canada VPT Huang electrical, Canada VPT Akira electrical, MRR-220 If you have questions or larger than, we stand ready and waiting for your visit to the site look for! Thank you for your support! ! Interested parties please contact Mr Tsang, Phone 28

  • Canada VPT Huang appliances, MRR-220 (Siemens Tang Jie) 2010-09-25

    Siemens, SIEMENS,, PLC, 6ES5, 6ES7, 6GK, 6AV, 6FM, 6EP, programmable controllers, digital, analog, interface, availability, Tang Jie 6ES7 Magnitude 027-59847899/15002740509 QQ: 228747787 6ES5, 6ES7, 6AV, 6XV, Canada VPT Akira electrical, MRR-220,, Si

  • Software engineering terms and concepts 2010-10-31

    Software crisis Software crisis is a phenomenon that is rising due to software complexity, software development and maintenance of the computer when a series of problems encountered, in particular in: Software development costs are high, costs are di

  • Extraction test requirements 2010-11-18

    Extraction test requirements The first is the basis for testing the business requirements specification, it should first extract the test requirements, the requirements extracted from the business requirements, business needs then divided into test r

  • Is your PC Running Slow? Stop the problem today! FREE-articles directory 2010-11-24

    You can STOP these processes to give your PC a larger amount of available RAM, your Speed boost and SO OPTIMIZE your System Operations. Then disable ALL Important processes such as Control programs for Music, Herve Leger Single Strap games or adware

  • Creating your Dream Life! 2010-11-25

    br br, and so is to create the ideal life .. br br Say day begins about you by stepping out of a budgetary position of close-to-home alone, most, most kadehti out of pocket, you enable the human economic lenkkeillä around in an isolated private area

  • The key technologies involved Hlink VPN (tunneling technology introduction. The second layer of the tunnel and the third layer of the tunnel) 2010-12-14

    The key technologies involved Hlink VPN (tunneling technology introduction, the second layer and third layer of the tunnel Tunnel) VPN is a network on the surface the way, than the line network, it has many advantages. In the VPN, by use of a so-call

  • Management awareness training to enhance the implementation force (excerpt) 2008-07-13

    My exposure to the IT industry through 40 years, has gone from engineers to managers, entrepreneurs change, in addition to the initial five years as an engineer, the other touches the years to Compaq, and then a bunch of young people to create cuttin

  • Hlink VPN involving key technologies (tunneling technology introduced the second floor and third floor tunnel tunnel) 2010-12-14

    Hlink VPN involving key technologies (tunneling technology introduction, the second layer and third layer of the tunnel the tunnel) VPN on the surface is a way of networking than line network, it has many advantages. A VPN, through the use of a so-ca

  • Tunneling SSH over an HTTP-Proxy Server 2013-05-08

    Can't use SSH on the standard port 22? Need to tunnel through a proxy server? Work behind a draconian firewall and can't SSH directly? No problem. This document will hopefully show you how to tunnel through an http-proxy server without any server-sid

  • Computer algebra system Mathematics software 2009-11-05

    GentleYang of Mathematics and Computer Science Mathematics and computer science in today has a very complex relationship, and computer technology is both a product of the common. For example, Google will claim that their software engineers to underst