Browse Definitions :

Good-bye, good-by, goodbye, goodby?

Writing for Business

Which is correct?
According to some lexicographers, we may soon be saying ______ to the word hello because so much communication these days is through social networking sites, such as Twitter and Facebook, where greetings tend to be less formal.
a. good-bye
b. good-by
c. goodbye
d. goodby


Answer: c, for AP style.

However, if you aren’t constrained by a style guide, you can probably get away with any variation you choose.

@EditorMark argues for saying goodbye to the hyphen and reports on various guides:

“The American Heritage and Webster’s New World dictionaries list goodbye as the first spelling. Bryan Garner in “Garner’s Modern American Usage,” compares the hyphenated form to the archaic “to-day.”

Merriam-Webster, though, includes only “good-bye” and “good-by.” Many style guides, including the Chicago Manual of Style, prefer a Merriam-Webster dictionary, so “good-bye” is with us for now.

The word in any form is only a few hundred years old, stemming from the earlier “good morning” and “good day,” etc., and a shortening of the phrase ‘God be with you.’”

**********

Ed Hurley reported that both hello and goodbye might be on the way out back in 2003:

Pretty soon “hello” and “goodbye” may become as passe as “ye” and “thou.”

Dig Deeper on Writing for Business

Networking
  • voice over LTE (VoLTE)

    Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.

  • ONOS (Open Network Operating System)

    Open Network Operating System (ONOS) is an OS designed to help network service providers build carrier-grade software-defined ...

  • telematics

    Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to ...

Security
  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

  • cyber espionage

    Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

CIO
  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

  • leadership

    Leadership is the ability of an individual or a group of people to influence and guide followers or members of an organization, ...

  • transaction

    In computing, a transaction is a set of related tasks treated as a single action.

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

  • service level indicator

    A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.

  • customer data platform (CDP)

    A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that ...

Close