Browse Definitions :

Is it inethical or unethical?

Writing for Business

Which is correct?

interrobang Be careful out there on Black Friday, and Cyber Monday too — _____ retailers will be pulling out the old bait and switch gag.
a. inethical
b. unethical

Answer: b

Explanation:

Why is unethical right? It just is. Like the ibles vs. ables issue, you pretty much just have to learn which words take which suffix or prefix. As Michael Quinion explains on World Wide Words, there is a rule — just not one that will do most of us any good. It’s kind of interesting, though. Here’s an excerpt:

There is a rule, but it’s only of value to somebody who knows which language the root word came from, so it’s really no help at all for most of us. In general, words take un- when they are of English (Germanic) origin and in- if they come from Latin. (The forms im-il-, and ir- are variations on in-.) Apart from that, there’s really no good guide to which one you should choose. You’re just going to have to stick to learning them by rote.

Let’s see how people are doing with this one…

Google poll:

inethical — 1,330,000 hits

unethical — 3,440,000 hits

That’s a pretty significant number of people getting it wrong. I had to stop and think about which was correct the other day, which is why I wrote this post. The best thing to do in that situation? Look it up.

twitter bird  Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close