Browse Definitions :

lowdown, low down or low-down

Writing for Business

Which is correct?
Read the FAQ to get the ______ on open source cloud computing.
a. low down
b. lowdown
c. low-down

Answer: b

Explanation:

If we want to differentiate among the three — and I always want to differentiate, if possible — here are distinct meanings for these variations:

There’s not much use for “low down.” You could use it to identify the location of something, as in: “The dishes were low down on the shelves” or “Security is too low down on the list of priorities.” In these contexts, either “low-down” or “lowdown” would be incorrect. The phrasing seems a little odd to me, though: I’d be more likely to say “The dishes were down low on the shelves” or “Security was down too low on the list of priorities.”

We typically hyphenate compound words used as adjectives, so that’s how we’d use “low-down.” As an adjective, “low-down” is usually used metaphorically to refer to the nasty or base nature of something — like a low-down, dirty cheat. It can also be low mood-wise as in the low-down blues.

Let’s use “lowdown” as a single word to refer to information, as in “the lowdown on portable apps” or something like that. Most sources also allow the hyphenated version as a noun meaning info but since we can have two distinct meanings, let’s keep them separate.

And then there’s “down-low,” which means secret, as in “Keep that on the down low.” According to the Urban Dictionary, if we really want to be sneaky we can use LDODL and those in the know will understand that we’re looking for the lowdown on the down-low. (Translates to: We want the information delivered to us discreetly.) The UD entry hyphenates both terms but… I’m not going to get into that again. Not today, anyway.

 Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

Networking
  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can ...

  • User Datagram Protocol (UDP)

    User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections...

  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

Security
  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close