Browse Definitions :

‘Tis the season or t’is the season?

Writing for Business

Which is correct?
Be careful shopping online: According to security experts, ____ the season for identity theft.
a. ’tis
b. t’is


Answer: A.

Explanation:

‘Tis is a contraction of it is. The rule with contractions is that we put the apostrophes where the letters are missing. The word ‘tis is an archaic contraction of the words it is. A similar contraction is ‘twas for it was, as in “Twas the night before Christmas.”

Return to the holiday grammar quiz for more questions.

'Tis the season poinsettiaThe meaning of ’tis the season

The phrase ‘tis the season comes from the popular Christmas carol “Deck the Halls” and is referenced in the lyrics: “Deck the halls with boughs of holly,  fa la la la la la la la la / ‘Tis the season to be jolly,  fa la la la la la la la la.

The melody of the Christmas carol Deck the Halls comes from a Welsh winter carol called Nos Galan and the English lyrics were written by Scottish musician and Queen Victoria’s court lyricist, Thomas Oliphant, in 1862.

The “season” in the phrase refers to the time of year that spans from late November, after American Thanksgiving, to January 6 — also known as Little Christmas, Three King’s Day and the Feast Day of the Epiphany.

During this festive season, multiple holidays, including Hanukkah, Kwanza, Christmas and New Year’s Eve feature traditions intended to create a feeling of holiday spirit, a sense of unity and tidings of joy and goodwill. With so many holidays centered on gift giving and merriment, this time of year has become generically known as the holiday season.

Dig Deeper on Writing for Business

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close