Browse Definitions :

“Withold” or “withhold”

Writing for Business

Which is correct?
Publicly traded companies cannot legally _________ financial results.
a. withold
b. withhold


Answer: b.

 

Explanation:
I was typing away this morning and had one of those lapses that seem to happen more frequently as I get older — I couldn’t remember whether “withhold” had one “h” or two. It’s an odd word, with two of them side by side there. I tried typing them both out to see which one looked right but they both looked funny so I resorted to looking it up.

Then I did a verbatim search on Google — does it drive anyone else slightly mad that Google returns results for what it thinks you meant instead of what you type? GRRRRR … Anyway, I did a verbatim search so it would stop correcting me and here’s what came up:

withold: 5,920,000 hits
withhold: 173,000,000 hits

So it looks like most people that use the word know how to spell it. Or, I suppose, look it up. That’s always a good option.

Withold vs. withhold is one of the questions in this spelling test. Maybe I’ll try it … I’m sure I’ll get that one right.
 

Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close