Browse Definitions :
Definition

emoticon

An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.

:-) Smile
;-) Smile with a wink
:<}) User with mustache, smiling
:-|| Mad
:-( Sad
:' -( Crying
:~ Also crying
:-)) Really happy
:-D Big grin
:-* A kiss
:-P~ A lick
:-o Wow! or I'm surprised
:-| Grim
:-P Sticking out your tongue
:- User happens to be Popeye
:-/ Perplexed
=:O Frightened (hair standing on end)
=8O Bug-eyed with fright
:-} Embarassed smile
:-)<>>>>> Basic Smiley with a necktie
;-^) Tongue in cheek
%*@:-( Hung over
:-~~~ Drooling
>:) Perplexed look
.) Keeping an eye out for you
8:-) Glasses on forehead
8:[ Normal smiling face of a gorilla
0:-) Angel
]:-|[ Robot
(:V) Duck
3:-o Cow
:-] Vampire
(_8-(|) Homer Simpson
C|:-= Charlie Chaplin
=|:-)= Abe Lincoln
*<:-) Santa Claus
-:-) User sports a mohawk and admires Mr. T
(:)-) Scuba diver
:-'| User has a cold
:-{} User with heavy lipstick
:-)8 User is well dressed
>:-< Mad
*#:-) Scotsman wearing his Scottish tam
%-^ User is another Picasso
#-) User partied all night
<:I Dunce
:-| "Have an ordinary day!" Smiley
:}{: Kisses (stolen from June bug)
oooo(0) (0)oooo Toes
(-_-) Secret smile
#.-o "Oh, nooooooo Mr. Bill!!!"
12x @>--->--- A dozen roses

The Japanese have worked out another set of emoticons that fits the nuances of Japanese culture. See Japanese emoticons.

This was last updated in March 2007
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close