Browse Definitions :

Can you use “between” when you’re talking about more than two things?

Writing for Business

Which is correct?
Instead of choosing _______ Dropbox, Google Drive and iCloud, people often use more than one cloud storage service.
a. between
b. among


Answer: a.

Explanation:
Although among isn’t strictly wrong, between is the better choice when you’re referring to a choice involving distinct entities, even if there are more than two. There’s a common grammar myth that you can only use the word “among” in reference to three or more items. In fact — as is so often the case — reality is a little more complicated than that.

@GrammarGirl explains:
“Here’s the deal: you can use the word “between” when you are talking about distinct, individual items even if there are more than two of them. For example, you could say, “She chose between Harvard, Brown, and Yale” because the colleges are individual items.
Relationships
The Chicago Manual of Style describes these as one-to-one relationships. Sometimes they are between two items, groups, or people, as in these sentences:

Choose between Squiggly and Aardvark.
Let’s keep this between you and me.

Other times they can be between more than two items, groups, or people as in these sentences:

The negotiations between the cheerleaders, the dance squad, and the flag team were going well despite the confetti incident.
The differences between English, Chinese, and Arabic are significant.”

 Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close