Browse Definitions :

Chuck it up, chalk it up or chock it up?

Writing for Business

Which is correct?

The VoIP system proposal wasn’t ready in time and we missed the deadline specified in the RFP.  We decided to just  ___________ to experience and get organized more quickly next time.

a. chuck it up

b. chalk it up

c. chock it up

Answer: b

Explanation:

To chalk something up is to attribute it. When we chalk something up to experience, we’re saying that although it wasn’t the outcome we wanted, we can at least learn from the experience.  The phrase originated with the custom of marking bar tabs and scores on a slate in pubs. So, if we had Wins, Losses and Experience on a chalk board, we would write resources put into VoIP system proposal under the Experience heading and use what we learned this time to improve our chances next time.

The phrase chalk one up for is a direct reference to the score-keeping custom. If we’d managed to get our proposal in on time and had the winning bid, we might have said Chalk one up for us! Metaphorically, we have a chalk board with the name of our company and the names of other companies that are submitting proposals. On that chalk board, we mark one under our company name because we won that contest.

The Online Slang Dictionary defines chalk up this way: “Surrender and accept the cause as something beyond one’s control or give credit to something beyond one’s control (if positive),” which is a fair translation of how the phrase is used.

Dig Deeper on Writing for Business

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close