Browse Definitions :
Definition

emoticon

An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.

:-) Smile
;-) Smile with a wink
:<}) User with mustache, smiling
:-|| Mad
:-( Sad
:' -( Crying
:~ Also crying
:-)) Really happy
:-D Big grin
:-* A kiss
:-P~ A lick
:-o Wow! or I'm surprised
:-| Grim
:-P Sticking out your tongue
:- User happens to be Popeye
:-/ Perplexed
=:O Frightened (hair standing on end)
=8O Bug-eyed with fright
:-} Embarassed smile
:-)<>>>>> Basic Smiley with a necktie
;-^) Tongue in cheek
%*@:-( Hung over
:-~~~ Drooling
>:) Perplexed look
.) Keeping an eye out for you
8:-) Glasses on forehead
8:[ Normal smiling face of a gorilla
0:-) Angel
]:-|[ Robot
(:V) Duck
3:-o Cow
:-] Vampire
(_8-(|) Homer Simpson
C|:-= Charlie Chaplin
=|:-)= Abe Lincoln
*<:-) Santa Claus
-:-) User sports a mohawk and admires Mr. T
(:)-) Scuba diver
:-'| User has a cold
:-{} User with heavy lipstick
:-)8 User is well dressed
>:-< Mad
*#:-) Scotsman wearing his Scottish tam
%-^ User is another Picasso
#-) User partied all night
<:I Dunce
:-| "Have an ordinary day!" Smiley
:}{: Kisses (stolen from June bug)
oooo(0) (0)oooo Toes
(-_-) Secret smile
#.-o "Oh, nooooooo Mr. Bill!!!"
12x @>--->--- A dozen roses

The Japanese have worked out another set of emoticons that fits the nuances of Japanese culture. See Japanese emoticons.

This was last updated in March 2007
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close