Skip to main content

HTTP STATUS CODES - Information Codes, Successful Codes, Redirection Codes, Client Error Codes, Server Error Codes, Request Methods

HTTP STATUS CODES

HTTP Status Codes
(Image Source - Google Images)


1XX = HTTP Information Codes:
    -100 : Continue
    -101 : Switching Protocols
    -102 : Processing
    -103 : Checkpoint
    -122 : Request-URI too Long


2XX = HTTP Successful Codes:
    -200 : OK
    -201 : Created
    -202 : Accepted
    -203 : Non-Authoritative Information
    -204 : No Content
    -205 : Reset Content
    -206 : Partial Content
    -207 : Multi-Status
    -208 : Already Reported
    -226 : IM Used


3XX = HTTP Redirection Codes:
    -300 : Multiple Choices
    -301 : Moved Permanently
    -302 : Found
    -303 : See Other
    -304 : Not Modified
    -305 : Use Proxy
    -306 : Switch Proxy
    -307 : Temporary Redirect
    -308 : Permanent Redirect


4XX = HTTP Client Error Codes:
    -400 : Bad Request
    -401 : Unauthorized
    -402 : Payment Required
    -403 : Forbidden
    -404 : Not Found
    -405 : Method Not Allowed
    -406 : Not Acceptable
    -407 : Proxy Authentication Required
    -408 : Request Timeout
    -409 : Conflict
    -410 : Gone
    -411 : Length Required
    -412 : Precondition Failed
    -413 : Request Entity too large
    -414 : Request URI too long
    -415 : Unsupported Media Type
    -416 : Request Range not
    -417 : Expectation Failed
    -418 : I am a teapot
    -422 : Un-processable Entity
    -423 : Locked
    -424 : Failed Dependency
    -425 : Unordered Collection
    -426 : Upgrade Required
    -428 : Precondition Required
    -429 : Too Many Requests
    -431 : Request Header Fields too large
    -444 : No Response
    -449 : Retry With
    -450 : Blocked by Windows Parental Controls
    -451 : Unavailable for Legal
    -499 : Client Closed Request
 

5XX = HTTP Server Error Codes:
    -500 : Internal Server Error
    -501 : Not Implemented
    -502 : Bad Gateway
    -503 : Service Unavailable
    -504 : Gateway Timeout
    -505 : HTTP Version Not Supported
    -506 : Variant Also Negotiates
    -507 : Insufficient Storage
    -508 : Loop Detected
    -509 : Bandwidth Limit Exceed
    -510 : Not Extended
    -511 : Network Authentication Required
    -598 : Network Read Timeout Error
    -599 : Network Connect Timeout Error


HTTP Request Methods:
    -GET : Requests a representation of the specified resource.
    -POST : Requests the Server to accept the entity enclosed in the request.
    -HEAD : Request similar to GET but without the response body.
    -PUT : Requests to store the enclosed entity to supplied URI.
    -DELETE : Delete the specified resource
    -OPTIONS : Returns the HTTP Methods supported by the server for URL Specified.
    -CONNECT : Starts a two-way communication with requested resource.

Comments

Popular posts from this blog

SQL Injection

SQL Injection The SQL Injection is a code penetration technique that might cause loss to our database. It is one of the most practiced web hacking techniques to place malicious code in SQL statements, via webpage input. SQL injection can be used to manipulate the application's web server by malicious users. SQL injection generally occurs when we ask a user to input their username/userID. Instead of a name or ID, the user gives us an SQL statement that we will unknowingly run on our database. For Example - we create a SELECT statement by adding a variable "demoUserID" to select a string. The variable will be fetched from user input (getRequestString). demoUserI = getrequestString("UserId"); demoSQL = "SELECT * FROM users WHERE UserId =" +demoUserId; Types of SQL injection attacks SQL injections can do more harm other than passing the login algorithms. Some of the SQL injection attacks include: Updating, deleting, and inserting the data: An attack can mo...

Schedule in DBMS

Schedule A series of operation from one transaction to another transaction is known as schedule. It is used to preserve the order of the operation in each of the individual transaction. 1. Serial Schedule The serial schedule is a type of schedule where one transaction is executed completely before starting another transaction. In the serial schedule, when the first transaction completes its cycle, then the next transaction is executed. For example: Suppose there are two transactions T1 and T2 which have some operations. If it has no interleaving of operations, then there are the following two possible outcomes: Execute all the operations of T1 which was followed by all the operations of T2.  Execute all the operations of T1 which was followed by all the operations of T2.  In the given (a) figure, Schedule A shows the serial schedule where T1 followed by T2. In the given (b) figure, Schedule B shows the serial schedule where T2 followed by T1. 2. Non-serial Schedule If interle...

Natural Language Processing (NLP)

What is Natural Language Processing (NLP) ? Natural Language Processing (NLP)* is a field of artificial intelligence (AI) that focuses on the interaction between computers and humans using natural language. It involves the development of algorithms and models that enable computers to understand, interpret, and generate human language. Here are key aspects of NLP: 1. *Text Understanding:* NLP systems aim to comprehend the meaning of written or spoken language. This involves tasks such as text classification, sentiment analysis, and named entity recognition. 2. *Speech Recognition:* NLP extends to processing spoken language, converting audio signals into text. This technology is used in voice assistants, transcription services, and more. 3. *Language Generation:* NLP systems can generate human-like text. This is employed in chatbots, language translation services, and content generation. 4. *Machine Translation:* NLP is fundamental to machine translation systems that enable the automatic...