Browse Definitions :

Threshold or threshhold?

Writing for Business

Which is correct?
The Scottish tradition of first-footing involves being the first person to step across a friend or neighbor’s _______ after midnight on January 1.
a. threshold
b. threshhold


Answer: a.

Explanation:

Oddly enough, I was inclined to think that threshhold must be the correct spelling because last month I discovered that withhold is correct, rather than withold. If you double the h in one, I thought, you probably double it in both. But no, it’s withhold and threshold. So, um, I was wrong both times. Just one more of those little idiosyncrasies that make English such a challenging language — even for native speakers.

A threshold, by the way, is a point of entry, a barrier that must be crossed. Specifically, it’s a door sill, although the meaning has generalized. According to folklore etymology, it was originally two words, thresh hold, meaning a barrier holding in the chaff flooring. A good story, but according to the Online Etymology Dictionary, thresh originally meant to tread, so it’s probably more akin to a stair tread.

Follow me on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • SOC 3 (System and Organization Controls 3)

    A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls ...

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • messaging security

    Messaging security is a subcategory of unified threat management, or UTM, focused on securing and protecting an organization's ...

CIO
  • value stream management

    Value stream management is an emerging business process intended to gauge the flow of value into business resources and ...

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

Close