Browse Definitions :
Definition

emoticon

An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.

:-) Smile
;-) Smile with a wink
:<}) User with mustache, smiling
:-|| Mad
:-( Sad
:' -( Crying
:~ Also crying
:-)) Really happy
:-D Big grin
:-* A kiss
:-P~ A lick
:-o Wow! or I'm surprised
:-| Grim
:-P Sticking out your tongue
:- User happens to be Popeye
:-/ Perplexed
=:O Frightened (hair standing on end)
=8O Bug-eyed with fright
:-} Embarassed smile
:-)<>>>>> Basic Smiley with a necktie
;-^) Tongue in cheek
%*@:-( Hung over
:-~~~ Drooling
>:) Perplexed look
.) Keeping an eye out for you
8:-) Glasses on forehead
8:[ Normal smiling face of a gorilla
0:-) Angel
]:-|[ Robot
(:V) Duck
3:-o Cow
:-] Vampire
(_8-(|) Homer Simpson
C|:-= Charlie Chaplin
=|:-)= Abe Lincoln
*<:-) Santa Claus
-:-) User sports a mohawk and admires Mr. T
(:)-) Scuba diver
:-'| User has a cold
:-{} User with heavy lipstick
:-)8 User is well dressed
>:-< Mad
*#:-) Scotsman wearing his Scottish tam
%-^ User is another Picasso
#-) User partied all night
<:I Dunce
:-| "Have an ordinary day!" Smiley
:}{: Kisses (stolen from June bug)
oooo(0) (0)oooo Toes
(-_-) Secret smile
#.-o "Oh, nooooooo Mr. Bill!!!"
12x @>--->--- A dozen roses

The Japanese have worked out another set of emoticons that fits the nuances of Japanese culture. See Japanese emoticons.

This was last updated in March 2007

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close