Browse Definitions :

Good-bye, good-by, goodbye, goodby?

Writing for Business

Which is correct?
According to some lexicographers, we may soon be saying ______ to the word hello because so much communication these days is through social networking sites, such as Twitter and Facebook, where greetings tend to be less formal.
a. good-bye
b. good-by
c. goodbye
d. goodby


Answer: c, for AP style.

However, if you aren’t constrained by a style guide, you can probably get away with any variation you choose.

@EditorMark argues for saying goodbye to the hyphen and reports on various guides:

“The American Heritage and Webster’s New World dictionaries list goodbye as the first spelling. Bryan Garner in “Garner’s Modern American Usage,” compares the hyphenated form to the archaic “to-day.”

Merriam-Webster, though, includes only “good-bye” and “good-by.” Many style guides, including the Chicago Manual of Style, prefer a Merriam-Webster dictionary, so “good-bye” is with us for now.

The word in any form is only a few hundred years old, stemming from the earlier “good morning” and “good day,” etc., and a shortening of the phrase ‘God be with you.’”

**********

Ed Hurley reported that both hello and goodbye might be on the way out back in 2003:

Pretty soon “hello” and “goodbye” may become as passe as “ye” and “thou.”

Dig Deeper on Writing for Business

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close