Browse Definitions :

Things you can do when you get to a bridge: Cross, burn or jump

Writing for Business

Which is correct?
We’ll _____ that bridge when we come to it.
a. cross
b. burn
c. jump off


Answer: It depends.

Explanation:
The standard expression is “cross that bridge when we come to it.” It means that you’ll deal with some potential event if and when it happens — it may not happen at all and if it does, it may be easier to see how to deal with it at that time.

“We’ll burn that bridge when we come to it” is considered to be a mixed metaphor/malaphor: an erroneous mixing of two metaphors. In this case, it’s a combination of “cross that bridge when one comes to it” and “to burn one’s bridges,” meaning to take an action that will eliminate some potential option. For example, if you toss your venti latte in the recruiter’s face at a job fair, you’re likely burning your bridges with that company. So if it may be necessary to decisively eliminate some option in the future, it would make sense to say you’ll burn that bridge when you come to it. I don’t think anyone does say that, mind you, but it would make perfect sense.

And then, of course, the other option is to jump. Site director Peggy Rouse occasionally says, when we’re discussing some deeply undesirable potential event, “Let’s jump off that bridge when we come to it.” Naturally, you don’t want to do it preemptively, as the undesirable event may never happen. And there hasn’t been anything that catastrophic yet. Should we come to the bridge we prefer not to cross, however, I picture us clasping hands like Thelma and Louise approaching that cliff and leaping. Unless we just decide to burn it instead.

So, anyway, what I’m saying is that I can see occasions for any of the three, depending on the particular bridge you’ve come to.

Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

Close