Browse Definitions :
Definition

emoticon

An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.

:-) Smile
;-) Smile with a wink
:<}) User with mustache, smiling
:-|| Mad
:-( Sad
:' -( Crying
:~ Also crying
:-)) Really happy
:-D Big grin
:-* A kiss
:-P~ A lick
:-o Wow! or I'm surprised
:-| Grim
:-P Sticking out your tongue
:- User happens to be Popeye
:-/ Perplexed
=:O Frightened (hair standing on end)
=8O Bug-eyed with fright
:-} Embarassed smile
:-)<>>>>> Basic Smiley with a necktie
;-^) Tongue in cheek
%*@:-( Hung over
:-~~~ Drooling
>:) Perplexed look
.) Keeping an eye out for you
8:-) Glasses on forehead
8:[ Normal smiling face of a gorilla
0:-) Angel
]:-|[ Robot
(:V) Duck
3:-o Cow
:-] Vampire
(_8-(|) Homer Simpson
C|:-= Charlie Chaplin
=|:-)= Abe Lincoln
*<:-) Santa Claus
-:-) User sports a mohawk and admires Mr. T
(:)-) Scuba diver
:-'| User has a cold
:-{} User with heavy lipstick
:-)8 User is well dressed
>:-< Mad
*#:-) Scotsman wearing his Scottish tam
%-^ User is another Picasso
#-) User partied all night
<:I Dunce
:-| "Have an ordinary day!" Smiley
:}{: Kisses (stolen from June bug)
oooo(0) (0)oooo Toes
(-_-) Secret smile
#.-o "Oh, nooooooo Mr. Bill!!!"
12x @>--->--- A dozen roses

The Japanese have worked out another set of emoticons that fits the nuances of Japanese culture. See Japanese emoticons.

This was last updated in March 2007
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close